Examtopics

AWS Certified Security - Specialty
  • Topic 1 Question 77

    A company maintains an open-source application that is hosted on a public GitHub repository. While creating a new commit to the repository, an engineer uploaded their AWS access key and secret access key. The engineer reported the mistake to a manager, and the manager immediately disabled the access key.

    The company needs to assess the impact of the exposed access key. A security engineer must recommend a solution that requires the least possible managerial overhead.

    Which solution meets these requirements?

    • Analyze an AWS Identity and Access Management (IAM) use report from AWS Trusted Advisor to see when the access key was last used.

    • Analyze Amazon CloudWatch Logs for activity by searching for the access key.

    • Analyze VPC flow logs for activity by searching for the access key.

    • Analyze a credential report in AWS Identity and Access Management (IAM) to see when the access key was last used.


    シャッフルモード