A healthcare company has multiple AWS accounts in an organization in AWS Organizations. The company uses Amazon S3 buckets to store sensitive information of patients. The company needs to restrict users from deleting any S3 bucket across the organization.
What is the MOST scalable solution that meets these requirements?
A medical company recently completed an acquisition and inherited an existing AWS environment. The company has an upcoming audit and is concerned about the compliance posture of its acquisition.
The company must identify personal health information inside Amazon S3 buckets and must identify S3 buckets that are publicly accessible. The company needs to prepare for the audit by collecting evidence in the environment.
Which combination of steps will meet these requirements with the LEAST operational overhead? (Select THREE.)
A company has created a set of AWS Lambda functions to automate incident response steps for incidents that occur on Amazon EC2 instances. The Lambda functions need to collect relevant artifacts, such as instance ID and security group configuration. The Lambda functions must then write a summary to an Amazon S3 bucket.
The company runs its workloads in a VPC that uses public subnets and private subnets. The public subnets use an internet gateway to access the internet. The private subnets use a NAT gateway to access the internet.
All network traffic to Amazon S3 that is related to the incident response process must use the AWS network. This traffic must not travel across the internet.
Which solution will meet these requirements?
An AWS account includes two S3 buckets: bucketl and bucket2. The bucket2 does not have a policy defined, but bucketl has the following bucket policy:
In addition, the same account has an 1AM User named "alice", with the following 1AM policy.
Which buckets can user "alice" access?
A company is investigating an increase in its AWS monthly bill. The company discovers that bad actors compromised some Amazon EC2 instances and served webpages for a large email phishing campaign.
A security engineer must implement a solution to monitor for cost increases in the future to help detect malicious activity.
Which solution will offer the company the EARLIEST detection of cost increases?
Kanisha
5 days agoMiesha
6 days agoCandra
18 days agoDan
1 months agoElliott
1 months agoAdelina
2 months agoAnnabelle
2 months agoStephane
2 months agoBerry
2 months agoLura
3 months agoEden
3 months agoFelicia
3 months agoRolande
3 months agoLeonie
4 months agoLarae
4 months agoRolland
4 months agoLorrine
4 months agoFausto
4 months agoCurtis
4 months agoBrock
5 months agoLazaro
5 months agoCasie
5 months agoGerald
5 months agoMarcos
6 months agoTawny
6 months agoClemencia
6 months agoArthur
6 months agoRashad
6 months agoRodrigo
7 months agoElvera
7 months agoDorinda
7 months agoJames
7 months agoGary
8 months agoShaniqua
9 months agoRory
9 months agoStephaine
9 months agoAmmie
9 months agoChristiane
9 months agoNu
10 months agoLamonica
12 months ago