Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified DevOps Engineer - Professional DOP-C02 All Questions

View all questions & answers for the AWS Certified DevOps Engineer - Professional DOP-C02 exam

Exam AWS Certified DevOps Engineer - Professional DOP-C02 topic 1 question 42 discussion

A company's application development team uses Linux-based Amazon EC2 instances as bastion hosts. Inbound SSH access to the bastion hosts is restricted to specific IP addresses, as defined in the associated security groups. The company's security team wants to receive a notification if the security group rules are modified to allow SSH access from any IP address.
What should a DevOps engineer do to meet this requirement?

  • A. Create an Amazon EventBridge rule with a source of aws.cloudtrail and the event name AuthorizeSecurityGroupIngress. Define an Amazon Simple Notification Service (Amazon SNS) topic as the target.
  • B. Enable Amazon GuardDuty and check the findings for security groups in AWS Security Hub. Configure an Amazon EventBridge rule with a custom pattern that matches GuardDuty events with an output of NON_COMPLIANT. Define an Amazon Simple Notification Service (Amazon SNS) topic as the target.
  • C. Create an AWS Config rule by using the restricted-ssh managed rule to check whether security groups disallow unrestricted incoming SSH traffic. Configure automatic remediation to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic.
  • D. Enable Amazon Inspector. Include the Common Vulnerabilities and Exposures-1.1 rules package to check the security groups that are associated with the bastion hosts. Configure Amazon Inspector to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ixdb
Highly Voted 1 year, 3 months ago
A is right. The Config rule restricted-ssh will not check the ingress rule that use the CIDR other than 0.0.0.0/0 and not notify anyone.
upvoted 18 times
csG13
11 months, 2 weeks ago
A would send a notification for ANY change in the security group. The question clearly states that wants only when 0.0.0.0/0 is allowed. Therefore, should be C.
upvoted 9 times
hoazgazh
7 months, 2 weeks ago
"a notification if the security group rules are modified to allow SSH access from any IP address" from any IP address => so A is correct, any change in SG should send noti
upvoted 1 times
...
...
...
MarDog
Highly Voted 1 year, 5 months ago
Selected Answer: A
I'm going to have to go with A on this one: https://aws.plainenglish.io/detecting-modifications-to-aws-ec2-security-groups-2ef8989a3350 https://repost.aws/knowledge-center/monitor-security-group-changes-ec2
upvoted 8 times
...
BrusingWayne
Most Recent 4 days, 10 hours ago
Option C (Incorrect): AWS Config rules are good for ongoing compliance checks, but they don't provide real-time notifications for changes. Config rules run periodically, which could result in a delay between the change and the notification. The automatic remediation aspect is not required in this scenario and could potentially interfere with legitimate changes. Hence, it is Option A.
upvoted 1 times
...
Impromptu
4 days, 11 hours ago
Selected Answer: C
A: Would send a message to SNS for every change, so not only SSH but all other ports/services. This would be too much. I do get the other comments that C would only notify for 0.0.0.0/0 but I think that is what the question is trying to state with "any IP".
upvoted 2 times
...
anuvindhs
1 month, 2 weeks ago
C is the answer : https://docs.aws.amazon.com/config/latest/developerguide/notifications-for-AWS-Config.html
upvoted 3 times
...
jamesf
3 months, 3 weeks ago
Selected Answer: C
keywords: Inbound SSH access C restricted for SSH port (22) only from ANY address
upvoted 3 times
...
shammous
4 months ago
A! "AWS Config provides rules such as restricted-ssh that can be used to detect Security Groups that have SSH access open for any IP".
upvoted 1 times
...
TioChico
4 months, 3 weeks ago
Selected Answer: A
A is right
upvoted 1 times
...
Sodev
6 months, 1 week ago
Selected Answer: A
I think keyword for C must be "ALL". ANY means when new IP is added to security group, so SNS will be triggered
upvoted 2 times
flaacko
3 months, 1 week ago
In the context of AWS when you see ANY IP address, it is probably referring to the 0.0.0.0/0 CIDR block which allows traffic from all or any IP address from the internet. When you use the restricteded-ssh managed rule, Security Groups will be labelled as NON_COMPLIANT when they allow unrestricted SSH traffic from anywhere or any IP address (0.0.0.0/0).
upvoted 1 times
...
...
liuyomz
6 months, 2 weeks ago
Selected Answer: C
C makes way more sense from the way AWS wants us to do it
upvoted 2 times
...
seetpt
6 months, 3 weeks ago
Selected Answer: C
i vote for c
upvoted 2 times
...
c3518fc
7 months, 2 weeks ago
Selected Answer: A
A. This is the correct solution because it leverages Amazon EventBridge to monitor for changes to the security group rules, specifically the AuthorizeSecurityGroupIngress event, which indicates that the security group rules have been modified to allow SSH access from any IP address. By creating an EventBridge rule with the appropriate event pattern and defining an Amazon SNS topic as the target, the DevOps engineer can ensure that the security team receives a notification whenever the security group rules are modified in an undesirable way.
upvoted 2 times
...
zijo
8 months, 1 week ago
Answer is C The restricted-ssh managed rule in AWS Config helps ensure your bastion host security groups are locked down for SSH access. It specifically checks if incoming SSH traffic is accessible for the security groups. The rule is considered COMPLIANT if: SSH access is not open to the public (meaning the rule doesn't find a security group allowing 0.0.0.0/0 for port 22). SSH access is restricted to specific IP addresses or security groups using CIDR notation (e.g., 10.0.0.0/16). If the rule detects a security group allowing SSH access from anywhere (0.0.0.0/0), it triggers a NON_COMPLIANT status.
upvoted 2 times
c3518fc
7 months, 2 weeks ago
Yeah, but has nothing to do with anyone changing it. A is your answer because it detects changes and sends out an email notification
upvoted 1 times
...
...
Cervus18
8 months, 1 week ago
Selected Answer: C
restricted-ssh : The rule is COMPLIANT if the IP addresses of the incoming SSH traffic in the security groups are restricted (CIDR other than 0.0.0.0/0 or ::/0). Otherwise, NON_COMPLIANT. https://docs.aws.amazon.com/config/latest/developerguide/restricted-ssh.html That addresses exactly the requirement !
upvoted 3 times
...
dzn
8 months, 2 weeks ago
Selected Answer: C
A is not meet the following requirements: `if the security group rules are modified to allow ssh access FROM ANY IP ADDRESS`
upvoted 5 times
...
4555894
8 months, 3 weeks ago
Selected Answer: A
https://aws.amazon.com/premiumsupport/knowledge-center/monitor-security-group-changes-ec2/
upvoted 2 times
...
Diego1414
8 months, 4 weeks ago
Selected Answer: C
Answer : C Keyword "allow SSH access from any IP address" A will send notification for any change made to the SG not just SSH
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...