exam questions

Exam AWS Certified Security - Specialty SCS-C02 All Questions

View all questions & answers for the AWS Certified Security - Specialty SCS-C02 exam

Exam AWS Certified Security - Specialty SCS-C02 topic 1 question 29 discussion

A team is using AWS Secrets Manager to store an application database password. Only a limited number of IAM principals within the account can have access to the secret. The principals who require access to the secret change frequently. A security engineer must create a solution that maximizes flexibility and scalability.
Which solution will meet these requirements?

  • A. Use a role-based approach by creating an IAM role with an inline permissions policy that allows access to the secret. Update the IAM principals in the role trust policy as required.
  • B. Deploy a VPC endpoint for Secrets Manager. Create and attach an endpoint policy that specifies the IAM principals that are allowed to access the secret. Update the list of IAM principals as required.
  • C. Use a tag-based approach by attaching a resource policy to the secret. Apply tags to the secret and the IAM principals. Use the aws:PrincipalTag and aws:ResourceTag IAM condition keys to control access.
  • D. Use a deny-by-default approach by using IAM policies to deny access to the secret explicitly. Attach the policies to an IAM group. Add all IAM principals to the IAM group. Remove principals from the group when they need access. Add the principals to the group again when access is no longer allowed.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
100fold
Highly Voted 1 year, 1 month ago
Selected Answer: C
Answer C https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction_attribute-based-access-control.html https://aws.amazon.com/blogs/security/simplify-granting-access-to-your-aws-resources-by-using-tags-on-aws-iam-users-and-roles/
upvoted 6 times
...
FunkyFresco
Most Recent 3 months, 2 weeks ago
Selected Answer: C
C makes sense to me.
upvoted 1 times
...
rishikeshshukla7777
9 months ago
answer is C tag based is ABAC
upvoted 1 times
...
arvehisa
9 months ago
Selected Answer: C
C, as the principles changes, it's not good to always update the trusted policies but to tag the IAM principles correctly.
upvoted 1 times
...
Raphaello
9 months, 2 weeks ago
Selected Answer: C
ABAC (aka tag-based policy control) provides flexible and scalable control.
upvoted 1 times
...
Selected Answer: A
A ,,,,,,,,,,,,,,
upvoted 2 times
1c7c461
11 months, 3 weeks ago
It is not A, it is not best-practice to use inline policies on a role.
upvoted 1 times
...
...
kejam
1 year ago
Selected Answer: C
https://docs.aws.amazon.com/secretsmanager/latest/userguide/managing-secrets_tagging.html
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...