ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 33 - SCS-C01 discussion

Report
Export

A company recently performed an annual security assessment of its AWS environment. The assessment showed that audit logs are not available beyond 90 days and that unauthorized changes to IAM policies are made without detection. How should a security engineer resolve these issues?

A.
Create an Amazon S3 lifecycle policy that archives AWS CloudTrail trail logs to Amazon S3 Glacier after 90 days. Configure Amazon Inspector to provide a notification when a policy change is made to resources.
Answers
A.
Create an Amazon S3 lifecycle policy that archives AWS CloudTrail trail logs to Amazon S3 Glacier after 90 days. Configure Amazon Inspector to provide a notification when a policy change is made to resources.
B.
Configure AWS Artifact to archive AWS CloudTrail logs Configure AWS Trusted Advisor to provide a notification when a policy change is made to resources.
Answers
B.
Configure AWS Artifact to archive AWS CloudTrail logs Configure AWS Trusted Advisor to provide a notification when a policy change is made to resources.
C.
Configure Amazon CloudWatch to export log groups to Amazon S3. Configure AWS CloudTrail to provide a notification when a policy change is made to resources.
Answers
C.
Configure Amazon CloudWatch to export log groups to Amazon S3. Configure AWS CloudTrail to provide a notification when a policy change is made to resources.
D.
Create an AWS CloudTrail trail that stores audit logs in Amazon S3. Configure an AWS Config rule to provide a notification when a policy change is made to resources.
Answers
D.
Create an AWS CloudTrail trail that stores audit logs in Amazon S3. Configure an AWS Config rule to provide a notification when a policy change is made to resources.
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html"For an ongoing record of events in your AWS account, you must create a trail. Although CloudTrailprovides 90 days of event history information for management events in the CloudTrail consolewithout creating a trail, it is not a permanent record, and it does not provide information about allpossible types of events. For an ongoing record, and for a record that contains all the event types youspecify, you must create a trail, which delivers log files to an Amazon S3 bucket that you specify." https://aws.amazon.com/blogs/security/how-to-record-and-govern-your-iam-resourceconfigurations-using-aws-config/

asked 16/09/2024
Vinayak H
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first