ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 253 - SCS-C02 discussion

Report
Export

A security engineer recently rotated all IAM access keys in an AWS account. The security engineer then configured AWS Config and enabled the following AWS

Config managed rules; mfa-enabled-for-iam-console-access, iam-user-mfa-enabled, access-key-rotated, and iam-user-unused-credentials-check.

The security engineer notices that all resources are displaying as noncompliant after the IAM GenerateCredentialReport API operation is invoked.

What could be the reason for the noncompliant status?

A.
The IAM credential report was generated within the past 4 hours.
Answers
A.
The IAM credential report was generated within the past 4 hours.
B.
The security engineer does not have the GenerateCredentialReport permission.
Answers
B.
The security engineer does not have the GenerateCredentialReport permission.
C.
The security engineer does not have the GetCredentialReport permission.
Answers
C.
The security engineer does not have the GetCredentialReport permission.
D.
The AWS Config rules have a MaximumExecutionFrequency value of 24 hours.
Answers
D.
The AWS Config rules have a MaximumExecutionFrequency value of 24 hours.
Suggested answer: D

Explanation:

The correct answer is D. The AWS Config rules have a MaximumExecutionFrequency value of 24 hours.

According to the AWS documentation1, the MaximumExecutionFrequency parameter specifies the maximum frequency with which AWS Config runs evaluations for a rule. For AWS Config managed rules, this value can be one of the following:

One_Hour

Three_Hours

Six_Hours

Twelve_Hours

TwentyFour_Hours

If the rule is triggered by configuration changes, it will still run evaluations when AWS Config delivers the configuration snapshot. However, if the rule is triggered periodically, it will not run evaluations more often than the specified frequency.

In this case, the security engineer enabled four AWS Config managed rules that are triggered periodically. Therefore, these rules will only run evaluations every 24 hours, regardless of when the IAM credential report is generated. This means that the resources will display as noncompliant until the next evaluation cycle, which could take up to 24 hours after the IAM access keys are rotated.

The other options are incorrect because:

A) The IAM credential report can be generated at any time, but it will not affect the compliance status of the resources until the next evaluation cycle of the AWS Config rules.

B) The security engineer was able to invoke the IAM GenerateCredentialReport API operation, which means they have the GenerateCredentialReport permission. This permission is required to generate a credential report that lists all IAM users in an AWS account and their credential status2.

C) The security engineer does not need the GetCredentialReport permission to enable or evaluate AWS Config rules. This permission is required to retrieve a credential report that was previously generated by using the GenerateCredentialReport operation2.

1: AWS::Config::ConfigRule - AWS CloudFormation 2: IAM: Generate and retrieve IAM credential reports

asked 16/09/2024
JAMIE JARAMILLO LOOR
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first