ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 484 - SAP-C01 discussion

Report
Export

During a security audit of a Service team’s application, a Solutions Architect discovers that a username and password for an Amazon RDS database and a set of AWS IAM user credentials can be viewed in the AWS Lambda function code. The Lambda function uses the username and password to run queries on the database, and it uses the IAM credentials to call AWS services in a separate management account. The Solutions Architect is concerned that the credentials could grant inappropriate access to anyone who can view the Lambda code. The management account and the Service team’s account are in separate AWS Organizations organizational units (OUs).

Which combination of changes should the Solutions Architect make to improve the solution’s security? (Choose two.)

A.
Configure Lambda to assume a role in the management account with appropriate access to AWS.
Answers
A.
Configure Lambda to assume a role in the management account with appropriate access to AWS.
B.
Configure Lambda to use the stored database credentials in AWS Secrets Manager and enable automatic rotation.
Answers
B.
Configure Lambda to use the stored database credentials in AWS Secrets Manager and enable automatic rotation.
C.
Create a Lambda function to rotate the credentials every hour by deploying a new Lambda version with the updated credentials.
Answers
C.
Create a Lambda function to rotate the credentials every hour by deploying a new Lambda version with the updated credentials.
D.
Use an SCP on the management account’s OU to prevent IAM users from accessing resources in the Service team’s account.
Answers
D.
Use an SCP on the management account’s OU to prevent IAM users from accessing resources in the Service team’s account.
E.
Enable AWS Shield Advanced on the management account to shield sensitive resources from unauthorized IAM access.
Answers
E.
Enable AWS Shield Advanced on the management account to shield sensitive resources from unauthorized IAM access.
Suggested answer: B, D
asked 16/09/2024
Ibrahim Ramku
51 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first