New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Amazon SCS-C02 Exam - Topic 5 Question 36 Discussion

Actual exam question for Amazon's SCS-C02 exam
Question #: 36
Topic #: 5
[All SCS-C02 Questions]

A company wants to receive automated email notifications when AWS access keys from developer AWS accounts are detected on code repository sites.

Which solution will provide the required email notifications?

Show Suggested Answer Hide Answer
Suggested Answer: A

The solution to receiving automated email notifications when AWS access keys are detected on code repository sites is to use Amazon EventBridge with Amazon GuardDuty findings. Specifically, creating an EventBridge rule that targets Amazon GuardDuty findings, particularly the UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration finding type, allows for the detection of potential unauthorized use or exposure of AWS credentials. When such a finding is detected, EventBridge can then trigger an action to send a notification via Amazon Simple Notification Service (Amazon SNS). By configuring an SNS topic to send emails, stakeholders can be promptly informed of such security incidents. This approach leverages AWS's native security and monitoring services to provide timely alerts with minimal operational overhead, ensuring that the company can respond quickly to potential security breaches involving exposed AWS credentials.


Contribute your Thoughts:

0/2000 characters
Tamie
3 months ago
D sounds complicated, why not keep it simple with A?
upvoted 0 times
...
Blossom
3 months ago
Wait, can you really get notifications for access keys like that? Sounds risky!
upvoted 0 times
...
Jaime
3 months ago
B is just too manual, not efficient at all.
upvoted 0 times
...
Kiley
4 months ago
I agree, A is definitely the way to go!
upvoted 0 times
...
Tran
4 months ago
Option A seems like the best choice for automated notifications.
upvoted 0 times
...
Willow
4 months ago
I don't recall seeing anything about anomaly detection software in our practice, so I'm leaning towards the EventBridge options instead.
upvoted 0 times
...
Nada
4 months ago
I’m a bit confused about option C; I thought AWS Health events were more about service disruptions rather than security alerts.
upvoted 0 times
...
Jade
4 months ago
I think option A sounds familiar because we practiced a similar question about monitoring AWS security events with SNS notifications.
upvoted 0 times
...
Jaime
5 months ago
I remember we discussed using EventBridge for triggering notifications, but I'm not sure if it's specifically for GuardDuty findings.
upvoted 0 times
...
Bonita
5 months ago
I'm a bit confused by the other options. Changing the account contact info or relying on AWS Health events don't seem directly relevant to the problem statement. And the anomaly detection approach in option D feels a bit overkill for this use case. I'm going to go with option A as the most straightforward and targeted solution.
upvoted 0 times
...
Chantell
5 months ago
Okay, I think I've got this. Option A looks like the right approach - using EventBridge to monitor GuardDuty for the specific UnauthorizedAccessIAMUser/InstanceCredentialExfiltrationOutsideAWS findings and then sending email notifications through SNS. That should give us the automated alerts we need.
upvoted 0 times
...
Clarinda
5 months ago
Hmm, I'm a bit unsure about this one. I know EventBridge and SNS can be used for notifications, but I'm not sure which specific findings or events I should be looking for. I'll need to review the AWS security services and documentation to make sure I understand the requirements fully.
upvoted 0 times
...
Ilona
5 months ago
This looks like a straightforward AWS security monitoring question. I'd start by carefully reading through the options and thinking about which AWS services could be used to detect the unauthorized access keys.
upvoted 0 times
...
Brunilda
1 year ago
I wonder if the company has considered setting up a dedicated email address just for these notifications. That way, they can keep their regular inbox clean and organized. *winks*
upvoted 0 times
...
Stanton
1 year ago
Hey, does anyone else feel like they're being watched? I mean, with all these AWS access keys floating around, it's like Big Brother is always watching. *chuckles*
upvoted 0 times
...
Farrah
1 year ago
Hmm, I'm torn between A and C. Guess I'll have to flip a coin on this one. Or maybe I'll just ask the AWS support team for a recommendation.
upvoted 0 times
Misty
1 year ago
True, C could also be a good choice. It's always good to get a second opinion from the AWS support team.
upvoted 0 times
...
Justine
1 year ago
You could also consider C as an alternative option for email notifications.
upvoted 0 times
...
Barney
1 year ago
I agree, A seems like the most suitable solution for this scenario.
upvoted 0 times
...
Jaime
1 year ago
I think A is the best option. It will provide the required email notifications.
upvoted 0 times
...
...
Rashad
1 year ago
B is an interesting approach, but I'm not sure if it's the most efficient way to handle this. Seems like a lot of manual work.
upvoted 0 times
Salley
1 year ago
D) Implement new anomaly detection software. Ingest AWS CloudTrail logs. Configure monitoring for ConsoleLogin events in the AWS Management Console. Configure email notifications from the anomaly detection software.
upvoted 0 times
...
Susy
1 year ago
C) Create an Amazon EventBridge rule that reacts to AWS Health events that have a value of Risk for the service category Configure email notifications by using Amazon Simple Notification Service (Amazon SNS).
upvoted 0 times
...
Hermila
1 year ago
A) Create an Amazon EventBridge rule to send Amazon Simple Notification Service (Amazon SNS) email notifications for Amazon GuardDuty UnauthorizedAccesslAMUser/lnstanceCredentialExfiltration OutsideAWS findings.
upvoted 0 times
...
...
Nobuko
1 year ago
D looks promising, but I'm not sure if it's overkill for this use case. Maybe a combination of A and C could work?
upvoted 0 times
Buck
1 year ago
Sina: A and C combined could be a good solution for this.
upvoted 0 times
...
Tasia
1 year ago
User 3: What about C? It also involves email notifications.
upvoted 0 times
...
Sina
1 year ago
User 2: Yeah, A seems like a good option for this use case.
upvoted 0 times
...
Sanjuana
1 year ago
User 1: I think A could work well for automated email notifications.
upvoted 0 times
...
...
Lashonda
1 year ago
A seems like a good option, but I'm not sure if it covers all the bases. Might need to look into the other solutions as well.
upvoted 0 times
Francine
1 year ago
C) Create an Amazon EventBridge rule that reacts to AWS Health events that have a value of Risk for the service category Configure email notifications by using Amazon Simple Notification Service (Amazon SNS).
upvoted 0 times
...
Antione
1 year ago
D) Implement new anomaly detection software. Ingest AWS CloudTrail logs. Configure monitoring for ConsoleLogin events in the AWS Management Console. Configure email notifications from the anomaly detection software.
upvoted 0 times
...
Erasmo
1 year ago
B) Change the AWS account contact information for the Operations type to a separate email address. Periodically poll this email address for notifications.
upvoted 0 times
...
Ashlee
1 year ago
A) Create an Amazon EventBridge rule to send Amazon Simple Notification Service (Amazon SNS) email notifications for Amazon GuardDuty UnauthorizedAccesslAMUser/lnstanceCredentialExfiltration OutsideAWS findings.
upvoted 0 times
...
...
Dortha
1 year ago
I agree with Larae. Option A seems to be the most efficient and effective solution for receiving automated email notifications.
upvoted 0 times
...
Larae
1 year ago
I think option A is the best solution because it uses Amazon EventBridge and Amazon SNS for email notifications.
upvoted 0 times
...

Save Cancel