exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 340 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 340
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A team is using AWS Secrets Manager to store an application database password. Only a limited number of IAM principals within the account can have access to the secret. The principals who require access to the secret change frequently. A security engineer must create a solution that maximizes flexibility and scalability.

Which solution will meet these requirements?

  • A. Use a role-based approach by creating an IAM role with an inline permissions policy that allows access to the secret. Update the IAM principals in the role trust policy as required.
  • B. Deploy a VPC endpoint for Secrets Manager. Create and attach an endpoint policy that specifies the IAM principals that are allowed to access the secret. Update the list of IAM principals as required.
  • C. Use a tag-based approach by attaching a resource policy to the secret. Apply tags to the secret and the IAM principals. Use the aws:PrincipalTag and aws:ResourceTag IAM condition keys to control access.
  • D. Use a deny-by-default approach by using IAM policies to deny access to the secret explicitly. Attach the policies to an IAM group. Add all IAM principals to the IAM group. Remove principals from the group when they need access. Add the principals to the group again when access is no longer allowed.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Toptip
1 year, 11 months ago
Selected Answer: C
C - ABAC approach
upvoted 1 times
...
ITGURU51
2 years ago
Attribute-based access control (ABAC) can be used to simplify permissions management at scale. You can use tags to control access to your AWS resources that support tagging, including IAM resources. You can tag IAM users and roles to control what they can access. C
upvoted 2 times
...
arpgaur
2 years, 3 months ago
Kinda wondering why not D? definetly more secure than C because of an implicit deny all rule.
upvoted 1 times
ITGURU51
2 years ago
ABAC is the most flexible solution given out of all possible choices.
upvoted 2 times
...
...
AdamWest
2 years, 5 months ago
Selected Answer: C
C - using tags you can now use attribute-based access control (ABAC) to simplify permissions management at scale. (Also Amazon is pushing this model) A - Will totally work however, its not as flexible or scalable as ABAC B- VPC policy good luck managing that. Not flexible or scalable. D - Not flexible and managing that would also suck. https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction_attribute-based-access-control.html
upvoted 4 times
...
neverletmego
2 years, 5 months ago
C. https://aws.amazon.com/blogs/security/simplify-granting-access-to-your-aws-resources-by-using-tags-on-aws-iam-users-and-roles/
upvoted 3 times
...
beebee
2 years, 5 months ago
Why not A?
upvoted 3 times
...
landsamboni
2 years, 5 months ago
B. https://docs.aws.amazon.com/secretsmanager/latest/userguide/vpc-endpoint-overview.html
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago