exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 55 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 55
Topic #: 1
[All AWS Certified Security - Specialty Questions]

Which approach will generate automated security alerts should too many unauthorized AWS API requests be identified?

  • A. Create an Amazon CloudWatch metric filter that looks for API call error codes and then implement an alarm based on that metric's rate.
  • B. Configure AWS CloudTrail to stream event data to Amazon Kinesis. Configure an AWS Lambda function on the stream to alarm when the threshold has been exceeded.
  • C. Run an Amazon Athena SQL query against CloudTrail log files. Use Amazon QuickSight to create an operational dashboard.
  • D. Use the Amazon Personal Health Dashboard to monitor the account's use of AWS services, and raise an alert if service error rates increase.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cloudguy365
Highly Voted 3 years, 7 months ago
A is correct answer. Open the CloudWatch console at https://console.aws.amazon.com/cloudwatch/. In the navigation pane, choose Logs. In the list of log groups, select the check box next to the log group that you created for CloudTrail log events. Choose Create Metric Filter. On the Define Logs Metric Filter screen, choose Filter Pattern and then type the following: { ($.errorCode = "*UnauthorizedOperation") || ($.errorCode = "AccessDenied*") } Choose Assign Metric. For Filter Name, type AuthorizationFailures. For Metric Namespace, type CloudTrailMetrics. For Metric Name, type AuthorizationFailureCount.
upvoted 105 times
cross
3 years, 6 months ago
But, it doesnt say that cloudtrail is setup in the account.
upvoted 4 times
Sickcnt
1 year, 9 months ago
"CloudTrail is enabled by default for your AWS account" https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-getting-started.html
upvoted 1 times
UjwalAbhonkar
1 year, 7 months ago
By default, when you create a trail in the console. Read carefully. CloudTrail is not enabled by default.
upvoted 1 times
RajAWSDevOps007
4 months ago
Cloudtrail is indeed enabled by default - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/view-cloudtrail-events.html
upvoted 1 times
...
...
...
...
AdamSmith
3 years, 6 months ago
Dude u are the best!
upvoted 13 times
...
JPThree
3 years, 4 months ago
Why did you think you need to look for errors? Illegal API calls could be successful calls. They are captured by CloudTrail. Answer: B
upvoted 3 times
...
...
hozefa
Highly Voted 3 years, 6 months ago
I had this question on my exam today. Correct answer is A
upvoted 15 times
...
RajAWSDevOps007
Most Recent 4 months ago
Selected Answer: A
A is the answer. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/view-cloudtrail-events.html
upvoted 1 times
...
Raphaello
1 year, 2 months ago
Selected Answer: C
For this question, and answer without mentioning CloudTrail does not sound right. A. could've been the best answer had it mentioned CloudTrail. I know it is enabled by default, but needs a trail toward CloudWatch to be created. https://docs.aws.amazon.com/securityhub/latest/userguide/cloudwatch-controls.html Related requirements: CIS AWS Foundations Benchmark v1.2.0/3.1 Resource type: AWS::Logs::MetricFilter, AWS::CloudWatch::Alarm, AWS::CloudTrail::Trail, AWS::SNS::Topic You can do real-time monitoring of API calls by directing CloudTrail logs to CloudWatch Logs and establishing corresponding metric filters and alarms. The check results in FAILED findings in the following cases: No trail is configured.
upvoted 1 times
Raphaello
1 year, 2 months ago
B. Has anyone seen an integration between CloudTrail and KDS? I haven't. My thinking, it would still need a trail toward S3 bucket, then a Lambda function to ingest data. C. Actually this is a very good answer. CoudTrail >> Athena (through S3) >> Quicksight dashboard where you can create threshold alerts. Still, it only mentioned creating dashboard, without alerts. D. Forget it. I'd say, this is a question made up by someone lacking enough information.
upvoted 1 times
...
...
Green53
1 year, 10 months ago
Selected Answer: A
Couldn't find anything to suggest CloudTrail can go directly to Kinesis, has to go via S3 first. Multiple articles state that this can be done via CloudWatch, although my instinct would be CloudTrail for API requests. I'd go A
upvoted 1 times
...
Robert0
1 year, 10 months ago
Selected Answer: A
"A" makes sense. The top comment explained very well
upvoted 1 times
...
matrpro
1 year, 12 months ago
Selected Answer: A
A is Correct - You cannot stream CloudTrail to kinesis so B is not the correct answer
upvoted 2 times
...
awsexamer2023
2 years, 1 month ago
Selected Answer: A
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/monitor-cloudtrail-log-files-with-cloudwatch-logs.html the process is described here
upvoted 3 times
...
sandeepsingh85
2 years, 2 months ago
A is Correct - You cannot stream CloudTrail to kinesis so B is not correct answer
upvoted 2 times
...
Suhasj02
2 years, 3 months ago
Selected Answer: A
https://aws.amazon.com/blogs/security/using-cloudtrail-to-identify-unexpected-behaviors-in-individual-workloads/ Activities within your AWS account can be recorded with CloudTrail, which makes it the ideal service not only for deeper investigations into past cloud activities but also to detect unwanted behaviors in near real time. CloudTrail sends logs to an S3 bucket and can forward events to CloudWatch. Using CloudWatch, you can perform searches across all CloudTrail events and define CloudWatch alarms for automatic notifications. You can create alerts for individual CloudTrail events that you consider an anomaly by creating CloudWatch filters and alarms. A filter defines the events that you want to monitor and an alarm defines the threshold when you want to be notified. Anomaly detection in the cloud monitors cloud service activities on the control plane and checks to see if the behavior is expected in the context of each workload
upvoted 1 times
...
arpgaur
2 years, 3 months ago
Answer is B. Option A creates an Amazon CloudWatch metric filter that looks for API call error codes and then implements an alarm based on that metric's rate. While this approach can detect when there are too many error codes, it does not take into account unauthorized requests. It only detect errors made by authorized request. It does not provide visibility into the security events that have occurred like unauthorized requests, which is the focus of the question.
upvoted 1 times
...
Mamas
2 years, 3 months ago
Selected Answer: B
A can do it , but B do it better
upvoted 1 times
...
GaniGaniGani
2 years, 4 months ago
Selected Answer: A
Recommended and out of the box solution is option A B while possible you need to write LAMBDA code and it requires more effort to build customer solution , so its not preferred for this use case.
upvoted 1 times
...
boooliyooo
2 years, 5 months ago
Selected Answer: B
Simply voting B to add thinking effort: A: Simplest and not real-time B: Complex and real-time Both are possible, and since the question didn't state the requirement, we should choose the most straightforward way out.
upvoted 2 times
...
bobsmith2000
2 years, 8 months ago
It would be A, if CloudTrail was configured to send logs to Cloud watch, which is disabled by default
upvoted 1 times
...
remyy
2 years, 11 months ago
Selected Answer: A
A Correct Answer
upvoted 3 times
...
lotfi50
3 years ago
Selected Answer: A
A is correct answer.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago