Topic 1 Question 159
2 つ選択A development team is creating an open source toolset to manage a company's software as a service (SaaS) application. The company stores the code in a public repository so that anyone can view and download the toolset's code.
The company discovers that the code contains an IAM access key and secret key that provide access to internal resources in the company’s AWS environment
A security engineer must implement a solution to identify whether unauthorized usage of the exposed credentials has occurred. The solution also must prevent any additional usage of the exposed credentials.
Which combination of steps will meet these requirements?
Use AWS Identity and Access Management Access Analyzer to determine which resources the exposed credentials accessed and who used them.
Deactivate the exposed IAM access key from the user’s IAM account.
Create a rule in Amazon GuardDuty to block the access key in the source code from being used.
Create a new IAM access key and secret key for the user whose credentials were exposed.
Generate an IAM credential report. Check the report to determine when the user that owns the access key last logged in.
ユーザの投票
コメント(6)
- 正解だと思う選択肢: AB
Security Engineer must identified whether unauthorized usage of the exposed credential has occurred and prevent any additional usage of the exposed credential. The Answers are A and B
👍 9f3f9bfe2024/05/09 A and E
👍 3danish12342024/05/14B, E correct
👍 3sema22322024/06/12
シャッフルモード