A security engineer needs to implement a write-once-read-many (WORM) model for data that a company will store in Amazon S3 buckets. The company uses the S3 Standard storage class for all of its S3 buckets. The security engineer must en-sure that objects cannot be overwritten or deleted by any user, including the AWS account root user.
Which solution will meet these requirements?
A healthcare company has multiple AWS accounts in an organization in AWS Organizations. The company uses Amazon S3 buckets to store sensitive information of patients. The company needs to restrict users from deleting any S3 bucket across the organization.
What is the MOST scalable solution that meets these requirements?
A medical company recently completed an acquisition and inherited an existing AWS environment. The company has an upcoming audit and is concerned about the compliance posture of its acquisition.
The company must identify personal health information inside Amazon S3 buckets and must identify S3 buckets that are publicly accessible. The company needs to prepare for the audit by collecting evidence in the environment.
Which combination of steps will meet these requirements with the LEAST operational overhead? (Select THREE.)
A company has created a set of AWS Lambda functions to automate incident response steps for incidents that occur on Amazon EC2 instances. The Lambda functions need to collect relevant artifacts, such as instance ID and security group configuration. The Lambda functions must then write a summary to an Amazon S3 bucket.
The company runs its workloads in a VPC that uses public subnets and private subnets. The public subnets use an internet gateway to access the internet. The private subnets use a NAT gateway to access the internet.
All network traffic to Amazon S3 that is related to the incident response process must use the AWS network. This traffic must not travel across the internet.
Which solution will meet these requirements?
An AWS account includes two S3 buckets: bucketl and bucket2. The bucket2 does not have a policy defined, but bucketl has the following bucket policy:
In addition, the same account has an 1AM User named "alice", with the following 1AM policy.
Which buckets can user "alice" access?
Izetta
8 days agoKanisha
25 days agoMiesha
26 days agoCandra
1 months agoDan
2 months agoElliott
2 months agoAdelina
2 months agoAnnabelle
3 months agoStephane
3 months agoBerry
3 months agoLura
3 months agoEden
4 months agoFelicia
4 months agoRolande
4 months agoLeonie
4 months agoLarae
4 months agoRolland
5 months agoLorrine
5 months agoFausto
5 months agoCurtis
5 months agoBrock
5 months agoLazaro
6 months agoCasie
6 months agoGerald
6 months agoMarcos
6 months agoTawny
6 months agoClemencia
7 months agoArthur
7 months agoRashad
7 months agoRodrigo
7 months agoElvera
7 months agoDorinda
8 months agoJames
8 months agoGary
9 months agoShaniqua
10 months agoRory
10 months agoStephaine
10 months agoAmmie
10 months agoChristiane
10 months agoNu
10 months agoLamonica
1 years ago