Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Amazon Exam SCS-C02 Topic 1 Question 42 Discussion

Actual exam question for Amazon's SCS-C02 exam
Question #: 42
Topic #: 1
[All SCS-C02 Questions]

A medical company recently completed an acquisition and inherited an existing AWS environment. The company has an upcoming audit and is concerned about the compliance posture of its acquisition.

The company must identify personal health information inside Amazon S3 buckets and must identify S3 buckets that are publicly accessible. The company needs to prepare for the audit by collecting evidence in the environment.

Which combination of steps will meet these requirements with the LEAST operational overhead? (Select THREE.)

Show Suggested Answer Hide Answer
Suggested Answer: A, E, F

Contribute your Thoughts:

Nickolas
2 months ago
Ah, the joys of cloud security. Reminds me of that classic joke: 'How many cloud engineers does it take to change a light bulb? None, they just rotate the server.'
upvoted 0 times
Veta
13 days ago
And maybe enable AWS Config to set up the s3-bucket-public-write-prohibited rule for extra security.
upvoted 0 times
...
Agustin
15 days ago
Agreed, we should also enable AWS Security Hub to review controls for publicly accessible S3 buckets.
upvoted 0 times
...
Glendora
16 days ago
I think we should definitely enable Amazon Macie to identify personal health information.
upvoted 0 times
...
Kiley
30 days ago
Haha, that's a good one!
upvoted 0 times
...
...
Filiberto
2 months ago
Hmm, I'm not sure about enabling Audit Manager. Seems like a lot of overhead just for an audit. Maybe we can keep it simple with Macie and GuardDuty.
upvoted 0 times
...
Donette
2 months ago
Glue and Macie, a dynamic duo to tackle this audit! I feel like we're about to become cybersecurity superheroes.
upvoted 0 times
...
Quentin
2 months ago
Option A seems like the way to go. Macie can do the heavy lifting for identifying sensitive data, and it's straightforward to use.
upvoted 0 times
Darrel
1 months ago
F) Enable AWS Config Set up the s3-bucket-public-write-prohibited AWS Config managed rule.
upvoted 0 times
...
Alberta
1 months ago
E) Enable AWS Security Hub. Use the AWS Foundational Security Best Practices standard. Review the controls dashboard for evidence of failed S3 Block Public Access controls.
upvoted 0 times
...
Moon
1 months ago
A) Enable Amazon Macie. Run an on-demand sensitive data discovery job that uses the PERSONALJNFORMATION managed data identifier.
upvoted 0 times
...
...
Dominga
2 months ago
We should also enable AWS Config and set up the s3-bucket-public-write-prohibited rule to prevent public access to S3 buckets.
upvoted 0 times
...
Rebecka
2 months ago
I agree with that. We can also enable AWS Security Hub to review controls dashboard for evidence of failed S3 Block Public Access controls.
upvoted 0 times
...
Keneth
3 months ago
I think we should enable Amazon Macie to identify personal health information in S3 buckets.
upvoted 0 times
...

Save Cancel