ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 259 - SCS-C01 discussion

Report
Export

A company is using CloudTrail to log all AWS API activity for all regions in all of its accounts. The CISO has asked that additional steps be taken to protect the integrity of the log files. What combination of steps will protect the log files from intentional or unintentional alteration?

Choose 2 answers from the options given below

Please select:

A.
Create an S3 bucket in a dedicated log account and grant the other accounts write only access.Deliver all log files from every account to this S3 bucket.
Answers
A.
Create an S3 bucket in a dedicated log account and grant the other accounts write only access.Deliver all log files from every account to this S3 bucket.
B.
Write a Lambda function that queries the Trusted Advisor Cloud Trail checks. Run the function every 10 minutes.
Answers
B.
Write a Lambda function that queries the Trusted Advisor Cloud Trail checks. Run the function every 10 minutes.
C.
Enable CloudTrail log file integrity validation
Answers
C.
Enable CloudTrail log file integrity validation
D.
Use Systems Manager Configuration Compliance to continually monitor the access policies of S3 buckets containing Cloud Trail logs.
Answers
D.
Use Systems Manager Configuration Compliance to continually monitor the access policies of S3 buckets containing Cloud Trail logs.
E.
Create a Security Group that blocks all traffic except calls from the CloudTrail service. Associate the security group with) all the Cloud Trail destination S3 buckets.
Answers
E.
Create a Security Group that blocks all traffic except calls from the CloudTrail service. Associate the security group with) all the Cloud Trail destination S3 buckets.
Suggested answer: A, C

Explanation:

The AWS Documentation mentions the following

To determine whether a log file was modified, deleted, or unchanged after CloudTrail delivered it you can use CloudTrail log fill integrity validation. This feature is built using industry standard algorithms:

SHA-256 for hashing and SHA-256 with RSA for digital signing. This makes it computationally infeasible to modify, delete or forge CloudTrail log files without detection. Option B is invalid because there is no such thing as Trusted Advisor Cloud Trail checks Option D is invalid because Systems Manager cannot be used for this purpose. Option E is invalid because Security Groups cannot be used to block calls from other services For more information on Cloudtrail log file validation, please visit the below URL:

https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-loe-file-validationintro.htmllFor more information on delivering Cloudtrail logs from multiple accounts, please visit the belowURL:

https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-receive-logs-from-multipleaccounts.htmlThe correct answers are: Create an S3 bucket in a dedicated log account and grant the other accountswrite only access. Deliver all log files from every account to this S3 bucket, Enable Cloud Trail log fileintegrity validationSubmit your Feedback/Queries to our Experts

asked 16/09/2024
Anthony Bradley
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first