Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Exam AWS Certified Security - Specialty topic 1 question 238 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 238
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company uses an external identity provider to allow federation into different AWS accounts. A security engineer for the company needs to identify the federated user that terminated a production Amazon EC2 instance a week ago.
What is the FASTEST way for the security engineer to identify the federated user?

  • A. Review the AWS CloudTrail event history logs in an Amazon S3 bucket and look for the TerminateInstances event to identify the federated user from the role session name.
  • B. Filter the AWS CloudTrail event history for the TerminateInstances event and identify the assumed IAM role. Review the AssumeRoleWithSAML event call in CloudTrail to identify the corresponding username.
  • C. Search the AWS CloudTrail logs for the TerminateInstances event and note the event time. Review the IAM Access Advisor tab for all federated roles. The last accessed time should match the time when the instance was terminated.
  • D. Use Amazon Athena to run a SQL query on the AWS CloudTrail logs stored in an Amazon S3 bucket and filter on the TerminateInstances event. Identify the corresponding role and run another query to filter the AssumeRoleWithWebIdentity event for the user name.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
Reference:
https://aws.amazon.com/blogs/security/how-to-easily-identify-your-federated-users-by-using-aws-cloudtrail/

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
cldy
Highly Voted 2 years, 11 months ago
B. within 90 days can be filtered on CT console.
upvoted 20 times
...
kk3322
Highly Voted 2 years, 11 months ago
B.. In this site https://aws.amazon.com/blogs/security/how-to-easily-identify-your-federated-users-by-using-aws-cloudtrail/
upvoted 10 times
JAWS1600
2 years, 11 months ago
B - Agree
upvoted 4 times
...
DahMac
2 years, 10 months ago
If several SAML users assume the same role, this does not work. " Before we start, it is important to note that the solution described in this post requires that each federated user making an AssumeRoleWithSAML API call have a unique role session name (such as [email protected])."
upvoted 2 times
...
...
jamesf
Most Recent 2 weeks, 6 days ago
Selected Answer: B
keywords: FASTEST way
upvoted 1 times
...
Basco78
9 months, 3 weeks ago
I go with Option A Both options A and B involves examining the CloudTrail logs, but Option A emphasizes identifying the federated user directly from the role session name associated with the TerminateInstances event. This approach is often more straightforward and faster in a federated identity scenario.
upvoted 1 times
...
pupsik
11 months, 1 week ago
Selected Answer: A
User federated identity should be right in the session name: “ When you use the AssumeRolewithSAML API to assume an IAM role, AWS sets the role session name value to the attribute provided by the identity provider, which your administrator defined. ”
upvoted 1 times
...
addy_prepare
1 year, 1 month ago
Selected Answer: B
https://aws.amazon.com/blogs/security/how-to-easily-identify-your-federated-users-by-using-aws-cloudtrail/
upvoted 1 times
...
samCarson
1 year, 3 months ago
Selected Answer: A
A. Review the AWS CloudTrail event history logs in an Amazon S3 bucket and look for the TerminateInstances event to identify the federated user from the role session name. By reviewing the CloudTrail event history logs and filtering for the TerminateInstances event, the security engineer can quickly identify the relevant event that led to the termination of the EC2 instance. The role session name associated with the event will indicate the federated user responsible for the action. This approach is the fastest because it directly targets the specific event of interest without the need for additional queries or searching through IAM Access Advisor or other logs.
upvoted 1 times
...
pal40sg
1 year, 3 months ago
Selected Answer: A
A: Review the AWS CloudTrail event history logs in an Amazon S3 bucket and look for the TerminateInstances event to identify the federated user from the role session name. AWS CloudTrail is a service that provides a history of AWS API calls made within an AWS account. By reviewing the CloudTrail event history logs, you can track and analyze the activities within the account. To identify the federated user who terminated the EC2 instance, you should look for the TerminateInstances event in the CloudTrail logs. This event indicates the termination of an EC2 instance. Within the event data, you can find information about the role session name associated with the event.
upvoted 1 times
pal40sg
1 year, 3 months ago
Option B (filtering CloudTrail event history for TerminateInstances event and identifying the assumed IAM role) and option C (searching CloudTrail logs for TerminateInstances event and checking IAM Access Advisor) may provide relevant information, but they involve additional steps and potential manual correlation to identify the specific federated user. They are not as fast as directly identifying the federated user from the role session name in the TerminateInstances event.
upvoted 1 times
...
...
jishrajesh
1 year, 8 months ago
Selected B
upvoted 1 times
...
maddyr
1 year, 9 months ago
Selected Answer: B
Cloudtrail event console quicker as event history is less than 90 days old
upvoted 1 times
...
sapien45
2 years ago
Selected Answer: B
https://aws.amazon.com/blogs/security/how-to-easily-identify-your-federated-users-by-using-aws-cloudtrail/ AssumeRoleWithSAML : Returns a set of temporary security credentials for users who have been authenticated via a SAML authentication response. This operation provides a mechanism for tying an enterprise identity store or directory to role-based AWS access without user-specific credentials or configuration.
upvoted 1 times
...
lotfi50
2 years, 3 months ago
Selected Answer: B
Answer is B
upvoted 1 times
...
f4bi4n
2 years, 5 months ago
I agree with B, but if we take a look at the link from kk3322, we can clearly see that in the first event we have the email address of the user. So A could also be an option...
upvoted 1 times
...
YouYouYou
2 years, 7 months ago
Selected Answer: D
external identity can be SAML or OpenID that eleminates A and C as the fastest solution along with the fact that multiple users could be assuming the role it leaves B and D and as a matter of fact B is a manual process while D can do it all in a single query which is the fastest way i'll go with D for sure.
upvoted 1 times
...
network_zeal
2 years, 8 months ago
B seems best option as per https://aws.amazon.com/blogs/security/how-to-easily-identify-your-federated-users-by-using-aws-cloudtrail/ but if multiple users had assumed the same role via SAML at the time the instance was terminated, how to identify the exact user is not clear.
upvoted 1 times
...
DahMac
2 years, 10 months ago
A. The federated user info is not in the TerminateInstance event. B. Could work, but possibly many Federated (SAML) users (Not web users) use the same assume role. Hopefully something will be better. C. AIM Access advisor only shows last time. D. Not about WebIdentity. -B- nothing is better.
upvoted 2 times
...
nparimi
2 years, 10 months ago
B external identity provider to allow federation into different AWS accounts, you need to use AssumeRoleWith SAML
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...