Examtopics

AWS Certified Security - Specialty
  • Topic 1 Question 207

    A company needs to detect unauthenticated access to its Amazon Elastic Kubernetes Service (Amazon EKS) clusters. The company needs a solution that requires no additional configuration of the existing EKS deployment.

    Which solution will meet these requirements with the LEAST operational effort?

    • Install an Amazon EKS add-on from a security vendor.

    • Enable AWS Security Hub. Monitor the Kubernetes findings.

    • Monitor Amazon CloudWatch Container Insights metrics for Amazon EKS.

    • Enable Amazon GuardDuty. Use EKS Audit Log Monitoring.


    シャッフルモード