Topic 1 Question 42
A company has thousands of AWS Lambda functions. While reviewing the Lambda functions, a security engineer discovers that sensitive information is being stored in environment variables and is viewable as plaintext in the Lambda console. The values of the sensitive information are only a few characters long. What is the MOST cost-effective way to address this security issue?
Set up IAM policies from the Lambda console to hide access to the environment variables.
Use AWS Step Functions to store the environment variables. Access the environment variables at runtime. Use IAM permissions to restrict access to the environment variables to only the Lambda functions that require access.
Store the environment variables in AWS Secrets Manager, and access them at runtime. Use IAM permissions to restrict access to the secrets to only the Lambda functions that require access.
Store the environment variables in AWS Systems Manager Parameter Store as secure string parameters, and access them at runtime. Use IAM permissions to restrict access to the parameters to only the Lambda functions that require access.
ユーザの投票
コメント(6)
- 正解だと思う選択肢: D
Store the environment variables as secure strings in Parameter Store. Most cost-effective way.
👍 5100fold2024/04/18 - 正解だと思う選択肢: D
Answer D There is no charge from Parameter Store to create a SecureString parameter. https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html#what-is-a-parameter
👍 5kejam2024/05/09 - 正解だと思う選択肢: C
Isn't C more secure?
👍 2stream36522024/04/26
シャッフルモード