Topic 1 Question 199
A company’s security engineer wants to receive an email alert whenever Amazon GuardDuty, AWS Identity and Access Management Access Analyzer, or Amazon Macie generate a high-severity security finding. The company uses AWS Control Tower to govern all of its accounts. The company also uses AWS Security Hub with all of the AWS service integrations turned on.
Which solution will meet these requirements with the LEAST operational overhead?
Set up separate AWS Lambda functions for GuardDuty, IAM Access Analyzer, and Macie to call each service's public API to retrieve high-severity findings. Use Amazon Simple Notification Service (Amazon SNS) to send the email alerts. Create an Amazon EventBridge rule to invoke the functions on a schedule.
Create an Amazon EventBridge rule with a pattern that matches Security Hub findings events with high severity. Configure the rule to send the findings to a target Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the desired email addresses to the SNS topic.
Create an Amazon EventBridge rule with a pattern that matches AWS Control Tower events with high severity. Configure the rule to send the findings to a target Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the desired email addresses to the SNS topic.
Host an application on Amazon EC2 to call the GuardDuty. IAM Access Analyzer, and Macie APIs. Within the application, use the Amazon Simple Notification Service (Amazon SNS) API to retrieve high-severity findings and to send the findings to an SNS topic. Subscribe the desired email addresses to the SNS topic.
ユーザの投票
コメント(2)
- 正解だと思う選択肢: B
Is the right answer
👍 2mercespsn2024/10/12 - 正解だと思う選択肢: B
The correct answer is:
B. Create an Amazon EventBridge rule with a pattern that matches Security Hub findings events with high severity. Configure the rule to send the findings to a target Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the desired email addresses to the SNS topic.
Explanation: Since the company is already using AWS Security Hub with integrations for GuardDuty, IAM Access Analyzer, and Macie, Security Hub aggregates findings from these services. By creating an Amazon EventBridge rule to match Security Hub findings with high severity, you can easily capture and trigger notifications when such findings occur. EventBridge can then send the findings to an SNS topic, and you can subscribe the desired email addresses to the SNS topic, which will send the email alerts. This approach is automated and centralized, reducing operational overhead while meeting the requirement of getting email alerts based on high-severity findings.
👍 1AWSLoverLoverLoverLoverLover2025/02/19
シャッフルモード