A security engineer configures VPC Flow Logs and the associated IAM role to log all VPC traffic to a log group in Amazon CloudWatch Logs. After a wait of 10 minutes, no logs are appearing in the log group. The security engineer confirms that traffic is being sent to the VPC. After additional debugging, the security engineer isolates the problem to the role that is associated with the VPC flow logs.
What could be the reason that the logs are not appearing in CloudWatch Logs?
[Infrastructure Security]
A company usesAWS Organizations to run workloads in multiple AWS accounts Currently the individual team members at the company access all Amazon EC2 instances remotely by using SSH or Remote Desktop Protocol (RDP) The company does not have any audit trails and security groups are occasionally open The company must secure access management and implement a centralized togging solution
Which solution will meet these requirements MOST securely?
To meet the requirements of securing access management and implementing a centralized logging solution, the most secure solution would be to:
Install a bastion host in the management account.
Reconfigure all SSH and RDP to allow access only from the bastion host.
Install AWS Systems Manager Agent (SSM Agent) on the bastion host.
Attach the AmazonSSMManagedlnstanceCore role to the bastion host.
Configure session data streaming to Amazon CloudWatch Logs in a separate logging account to audit log data
This solution provides the following security benefits:
It uses AWS Systems Manager Session Manager instead of traditional SSH and RDP protocols, which provides a secure method for accessing EC2 instances without requiring inbound firewall rules or open ports.
It provides audit trails by configuring Session Manager logging to Amazon CloudWatch Logs and creating a separate logging account to audit the log data.
It uses the AWS Systems Manager Agent to automate common administrative tasks and improve the security posture of the instances.
The separate logging account with cross-account permissions provides better data separation and improves security posture.
https://aws.amazon.com/solutions/implementations/centralized-logging/
[Identity and Access Management]
A company's engineering team is developing a new application that creates IAM Key Management Service (IAM KMS) CMK grants for users immediately after a grant IS created users must be able to use the CMK tu encrypt a 512-byte payload. During load testing, a bug appears |intermittently where AccessDeniedExceptions are occasionally triggered when a userrst attempts to encrypt using the CMK
Which solution should the c0mpany's security specialist recommend'?
To avoid AccessDeniedExceptions when users first attempt to encrypt using the CMK, the security specialist should recommend the following solution:
Instruct the engineering team to pass the grant token returned in the CreateGrant response to users. This allows the engineering team to use the grant token as a form of temporary authorization for the grant.
Instruct users to use that grant token in their call to encrypt. This allows the users to use the grant token as a proof that they have permission to use the CMK, and to avoid any eventual consistency issues with the grant creation.
[Identity and Access Management]
A company's policy requires that all API keys be encrypted and stored separately from source code in a centralized security account. This security account is managed by the company'ssecurity team However, an audit revealed that an API key is steed with the source code of an IAM Lambda function m an IAM CodeCommit repository in the DevOps account
How should the security learn securely store the API key?
To securely store the API key, the security team should do the following:
Create a secret in AWS Secrets Manager in the security account to store the API key using AWS Key Management Service (AWS KMS) for encryption. This allows the security team to encrypt and manage the API key centrally, and to configure automatic rotation schedules for it.
Grant access to the IAM role used by the Lambda function so that the function can retrieve the key from Secrets Manager and call the API. This allows the security team to avoid storing the API key with the source code, and to use IAM policies to control access to the secret.
[Logging and Monitoring]
A company hosts a web application on an Apache web server. The application runs on Amazon EC2 instances that are in an Auto Scaling group. The company configured the EC2 instances to send the Apache web server logs to an Amazon CloudWatch Logs group that the company has configured to expire after 1 year.
Recently, the company discovered in the Apache web server logs that a specific IP address is sending suspicious requests to the web application. A security engineer wants to analyze the past week of Apache web server logs to determine how many requests that the IP address sent and the corresponding URLs that the IP address requested.
What should the security engineer do to meet these requirements with the LEAST effort?
Justine
17 hours agoNiesha
9 days agoJonelle
16 days agoLatosha
23 days agoAlita
1 month agoTitus
1 month agoHelaine
2 months agoRoyal
2 months agoAnnelle
2 months agoAudrie
2 months agoMiesha
3 months agoRossana
3 months agoSharika
3 months agoVivienne
3 months agoRasheeda
4 months agoDannette
4 months agoDorinda
4 months agoShakira
4 months agoLashunda
5 months agoNoe
5 months agoWava
5 months agoIsadora
5 months agoNydia
6 months agoAnnabelle
6 months agoSusana
8 months agoNaomi
9 months agoLauran
10 months agoDelmy
10 months agoIzetta
11 months agoKanisha
11 months agoMiesha
11 months agoCandra
12 months agoDan
1 year agoElliott
1 year agoAdelina
1 year agoAnnabelle
1 year agoStephane
1 year agoBerry
1 year agoLura
1 year agoEden
1 year agoFelicia
1 year agoRolande
1 year agoLeonie
1 year agoLarae
1 year agoRolland
1 year agoLorrine
1 year agoFausto
1 year agoCurtis
1 year agoBrock
1 year agoLazaro
1 year agoCasie
1 year agoGerald
1 year agoMarcos
1 year agoTawny
1 year agoClemencia
1 year agoArthur
1 year agoRashad
1 year agoRodrigo
1 year agoElvera
1 year agoDorinda
2 years agoJames
2 years agoGary
2 years agoShaniqua
2 years agoRory
2 years agoStephaine
2 years agoAmmie
2 years agoChristiane
2 years agoNu
2 years agoLamonica
2 years ago