ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 247 - SCS-C02 discussion

Report
Export

A security engineer is designing an IAM policy to protect AWS API operations. The policy must enforce multi-factor authentication (MFA) for IAM users to access certain services in the AWS production account. Each session must remain valid for only 2 hours. The current version of the IAM policy is as follows:

Which combination of conditions must the security engineer add to the IAM policy to meet these requirements? (Select TWO.)

A.
'Bool ' : ' aws : Multi FactorAuthPresent': 'true' }
Answers
A.
'Bool ' : ' aws : Multi FactorAuthPresent': 'true' }
B.
'Bool ' : ' aws : MultiFactorAuthPresent': 'false' }
Answers
B.
'Bool ' : ' aws : MultiFactorAuthPresent': 'false' }
C.
'NumericLessThan' : { ' aws : Multi FactorAuthAge' : '7200'}
Answers
C.
'NumericLessThan' : { ' aws : Multi FactorAuthAge' : '7200'}
D.
'NumericGreaterThan' : { ' aws : MultiFactorAuthAge ' : '7200'
Answers
D.
'NumericGreaterThan' : { ' aws : MultiFactorAuthAge ' : '7200'
E.
'NumericLessThan' : { 'MaxSessionDuration ' : '7200'}
Answers
E.
'NumericLessThan' : { 'MaxSessionDuration ' : '7200'}
Suggested answer: A, C

Explanation:

The correct combination of conditions to add to the IAM policy is A and C: These conditions will ensure that IAM users must use MFA to access certain services in the AWS production account, and that each session will expire after 2 hours.

Option A: ''Bool'' : { ''aws:MultiFactorAuthPresent'' : ''true'' } is a valid condition that checks if the principal (the IAM user) has authenticated with MFA before making the request. This condition will enforce MFA for the IAM users to access the specified services. This condition key is supported by all AWS services that support IAM policies1.

Option B: ''Bool'' : { ''aws:MultiFactorAuthPresent'' : ''false'' } is the opposite of option

A) This condition will allow access only if the principal has not authenticated with MFA, which is not the desired requirement. This condition key is supported by all AWS services that support IAM policies1.

Option C: ''NumericLessThan'' : { ''aws:MultiFactorAuthAge'' : ''7200'' } is a valid condition that checks if the time since the principal authenticated with MFA is less than 7200 seconds (2 hours). This condition will enforce the session duration limit for the IAM users. This condition key is supported by all AWS services that support IAM policies1.

Option D: ''NumericGreaterThan'' : { ''aws:MultiFactorAuthAge'' : ''7200'' } is the opposite of option C) This condition will allow access only if the time since the principal authenticated with MFA is more than 7200 seconds (2 hours), which is not the desired requirement. This condition key is supported by all AWS services that support IAM policies1.

Option E: ''NumericLessThan'' : { ''MaxSessionDuration'' : ''7200'' } is not a valid condition key. MaxSessionDuration is a property of an IAM role, not a condition key. It specifies the maximum session duration (in seconds) for the role, which can be between 3600 and 43200 seconds (1 to 12 hours). This property can be set when creating or modifying a role, but it cannot be used as a condition in a policy2.

asked 16/09/2024
Angélica González
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first