[Infrastructure Security]
A Security Engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password.
Which combination of steps can the Engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)
AWS Secrets Manager is a service that helps you manage, retrieve, and rotate secrets such as database credentials, API keys, and other sensitive information. By configuring automatic rotation of credentials in AWS Secrets Manager, you can ensure that your secrets are changed regularly and securely, without requiring manual intervention or application downtime.You can also specify the rotation frequency and the rotation function that performs the logic of changing the credentials on the database and updating the secret in Secrets Manager1.
[Logging and Monitoring]
A company hosts an end user application on AWS Currently the company deploys the application on Amazon EC2 instances behind an Elastic Load Balancer The company wants to configure end-to-end encryption between the Elastic Load Balancer and the EC2 instances.
Which solution will meet this requirement with the LEAST operational effort?
To configure end-to-end encryption between the Elastic Load Balancer and the EC2 instances with the least operational effort, the most appropriate solution would be to use Amazon issued AWS Certificate Manager (ACM) certificates on the EC2 instances and the Elastic Load Balancer to configure end-to-end encryption.
AWS Certificate Manager - Amazon Web Services:Elastic Load Balancing - Amazon Web Services:Amazon Elastic Compute Cloud - Amazon Web Services:AWS Certificate Manager - Amazon Web Services
For compliance reasons a Security Engineer must produce a weekly report that lists any instance that does not have the latest approved patches applied. The Engineer must also ensure that no system goes more than 30 days without the latest approved updates being applied
What would the MOST efficient way to achieve these goals?
A security engineer needs to implement a write-once-read-many (WORM) model for data that a company will store in Amazon S3 buckets. The company uses the S3 Standard storage class for all of its S3 buckets. The security engineer must en-sure that objects cannot be overwritten or deleted by any user, including the AWS account root user.
Which solution will meet these requirements?
A healthcare company has multiple AWS accounts in an organization in AWS Organizations. The company uses Amazon S3 buckets to store sensitive information of patients. The company needs to restrict users from deleting any S3 bucket across the organization.
What is the MOST scalable solution that meets these requirements?
Susana
34 minutes agoNaomi
29 days agoLauran
2 months agoDelmy
2 months agoIzetta
3 months agoKanisha
4 months agoMiesha
4 months agoCandra
4 months agoDan
5 months agoElliott
5 months agoAdelina
5 months agoAnnabelle
5 months agoStephane
6 months agoBerry
6 months agoLura
6 months agoEden
6 months agoFelicia
7 months agoRolande
7 months agoLeonie
7 months agoLarae
7 months agoRolland
7 months agoLorrine
7 months agoFausto
8 months agoCurtis
8 months agoBrock
8 months agoLazaro
8 months agoCasie
8 months agoGerald
9 months agoMarcos
9 months agoTawny
9 months agoClemencia
9 months agoArthur
10 months agoRashad
10 months agoRodrigo
10 months agoElvera
10 months agoDorinda
10 months agoJames
11 months agoGary
12 months agoShaniqua
1 years agoRory
1 years agoStephaine
1 years agoAmmie
1 years agoChristiane
1 years agoNu
1 years agoLamonica
1 years ago