exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 237 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 237
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A developer is building a serverless application hosted on AWS that uses Amazon Redshift as a data store. The application has separate module for read/write and read-only functionality. The modules need their own database users for compliance reasons.
Which combination of steps should a security engineer implement to grant appropriate access? (Choose two.)

  • A. Configure cluster security groups for each application module to control access to database users that are required for read-only and read-write.
  • B. Configure a VPC endpoint for Amazon Redshift. Configure an endpoint policy that maps database users to each application module, and allow access to the tables that are required for read-only and read/write.
  • C. Configure an IAM policy for each module. Specify the ARN of an Amazon Redshift database user that allows the GetClusterCredentials API call.
  • D. Create local database users for each module.
  • E. Configure an IAM policy for each module. Specify the ARN of an IAM user that allows the GetClusterCredentials API call.
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DayQuil
Highly Voted 3 years, 7 months ago
C and D. C: Create the individual users for each module. D: Grant those users access to perform read and write actions to the Redshift datastore. And yes, Redshift DB users have their own ARN in this format: arn:aws:redshift:region:account-id:dbuser:cluster-name/user-name
upvoted 21 times
Daniel76
3 years, 6 months ago
https://docs.aws.amazon.com/redshift/latest/mgmt/redshift-iam-access-control-identity-based.html
upvoted 2 times
...
...
samCarson
Most Recent 1 year, 10 months ago
Selected Answer: AD
A security engineer should configure cluster security groups for each application module to control access to the Redshift database users responsible for read-only and read-write operations. This ensures that each module has its own specific access privileges based on compliance requirements. Additionally, the engineer should configure an IAM policy for each module, specifying the ARN of an Amazon Redshift database user that allows the GetClusterCredentials API call. This enables fine-grained access control and grants temporary access credentials to each module based on its IAM role, ensuring secure and scalable access management. D is not ideal because creating local database users for each module does not provide a centralized and scalable approach. It would require managing and maintaining multiple database users separately, which can be cumbersome and less secure compared to using IAM roles for access control.
upvoted 2 times
captainpike
1 year, 9 months ago
I believe you meant to select A and C, not A and D
upvoted 1 times
...
...
pal40sg
1 year, 11 months ago
Selected Answer: AC
A. Configure cluster security groups for each application module to control access to database users that are required for read-only and read-write. By configuring cluster security groups, you can define the inbound and outbound rules that control network access to the Amazon Redshift clusters. You can associate the appropriate security groups with each module to restrict access based on the required permissions. C. Configure an IAM policy for each module. Specify the ARN of an Amazon Redshift database user that allows the GetClusterCredentials API call. IAM policies allow you to define fine-grained permissions for different modules of the application. By specifying the ARN of an Amazon Redshift database user in the IAM policy, you can grant access to specific resources and actions needed for each module. The GetClusterCredentials API call is used to obtain temporary credentials for connecting to the Redshift cluster.
upvoted 2 times
...
ITGURU51
2 years ago
To grant appropriate access to the Amazon Redshift data store for the serverless application hosted on AWS, a security engineer should implement the following two steps: C. Configure an IAM policy for each module. Specify the ARN of an Amazon Redshift database user that allows the GetClusterCredentials API call. D. Create local database users for each module.CD
upvoted 1 times
...
awsguru1998
2 years, 1 month ago
AE Option E is a valid solution to grant appropriate access to the separate modules of the serverless application hosted on AWS that uses Amazon Redshift as a data store. By configuring an IAM policy for each module and specifying the ARN of an IAM user that allows the GetClusterCredentials API call, you can enable the application modules to request temporary database credentials that are scoped to a specific cluster database user and have specific permissions. This approach provides separation of duties, as well as centralized management of user access and permissions through IAM.
upvoted 1 times
...
SergioP
2 years, 2 months ago
why not a y b?
upvoted 1 times
...
boooliyooo
2 years, 3 months ago
So, both C and D provide a solution to control the access to the Redshift tables through specific users per module, option C uses IAM policies to retrieve the credentials for the specific user and D creates the user inside Redshift. Option B and E, on the other hand, focus on controlling access through the network layer and IAM policies respectively. It would depend on your specific use case and compliance requirements which option would be the best fit.
upvoted 1 times
...
vbal
2 years, 7 months ago
Answer is A&D: Amazon Redshift - Creating Read Only Users 1. First, create a group that will be used for read only access: create group readonly; SQL 2. Revoke default create rights in the public schema: revoke create on schema public from group readonly; SQL 3. Grant usage access in the public schema: grant usage on schema public to group readonly; SQL 4. Grant access to current tables in the public schema: grant select on all tables in schema public to group readonly; SQL 5. Grant access to future tables in the public schema: alter default privileges in schema public grant select on tables to group readonly; SQL 6. Create a user: create user <username> with password '<password>'; SQL 7. Associate the new user and group: alter group readonly add user <username>;
upvoted 1 times
vbal
2 years, 7 months ago
C, D Create Local Users & Restrict Module's Access to a specific User using IAM Policy.
upvoted 1 times
...
...
sapien45
2 years, 8 months ago
Selected Answer: AD
Based on the fact that by default : When you provision an Amazon Redshift cluster, it is locked down by default so nobody has access to it. To grant other users inbound access to an Amazon Redshift cluster, you associate the cluster with a security group. https://docs.aws.amazon.com/redshift/latest/mgmt/working-with-security-groups.html
upvoted 1 times
...
dcasabona
2 years, 8 months ago
Selected Answer: CD
Option C and D.
upvoted 1 times
...
Geetar
2 years, 9 months ago
Selected Answer: CD
CD checks out Redshift DB users have their own ARN in this format: arn:aws:redshift:region:account-id:dbuser:cluster-name/user-name
upvoted 2 times
...
TigerInTheCloud
3 years ago
Selected Answer: AD
A - This is the essential request of being able to access the database. B - VPC endpoint is a good security practice but is not essential. Also, "endpoint policy that maps database users" means having IAM user/role access redshift data. It is not nature from my point of view. C - This requires D, and the ARN of the database user sounds weird - back to B? D - local database user is nature to the Redshig (based on PostgreSQL comp) native access control approach. E - For IAM user, there is a need of storing its credential securely. If it is mentioned as IAM role, I will choose this as the third step.
upvoted 1 times
captainpike
1 year, 9 months ago
C - "And yes, Redshift DB users have their own ARN in this format: arn:aws:redshift:region:account-id:dbuser:cluster-name/user-name"
upvoted 1 times
...
...
MoreOps
3 years, 1 month ago
Selected Answer: CD
C D - C and D makes the most sense to me, i was surprised to see people selected A, SG is for allowing access , but from the question being "granting access" i think its more permissions wise then network connectivity
upvoted 2 times
...
Skr81
3 years, 1 month ago
I don't think the security group controls the user-level access.
upvoted 2 times
captainpike
1 year, 9 months ago
https://docs.aws.amazon.com/redshift/latest/mgmt/working-with-security-groups.html
upvoted 1 times
...
...
Radhaghosh
3 years, 2 months ago
Selected Answer: AC
Answer is A & C
upvoted 1 times
...
AWS_Dude
3 years, 3 months ago
Answer: A and D Don't need to create IAM policies for each module. The question is asking about proper access. To do this we need to create the cluster users and make sure the SGs are set up properly.
upvoted 2 times
AWS_Dude
3 years, 2 months ago
BEST EXPLANATION: "When you provision an Amazon Redshift cluster, it is locked down by default so nobody has access to it". (https://docs.aws.amazon.com/redshift/latest/mgmt/working-with-security-groups.html)This means that even if you have the correct IAM policies/roles those users will still not be able to access the RedShift cluster. This is why A is correct. We have to change the RedShift SG to allow our users access. And of course D, since we have to create users for the modules. Not B since RedShift VPC endpoints are only for S3 and nothing else. Read what is in the red highlighted box. (https://docs.aws.amazon.com/redshift/latest/mgmt/enhanced-vpc-working-with-endpoints.html) Not C or E because, again, it doesn't matter if the IAM roles/policies are created/applied. Our users need access to the RedShift cluster through the Security Group which by default, is blocked!!!
upvoted 3 times
s50600822
1 year, 9 months ago
The latter half of A is kind of BS to control access to database users that are required for read-only and read-write. Though I know what you meant, the step including sorting out the network access and then the user inside the database itself, I don't think A means what you think it means.
upvoted 1 times
...
...
...
KaliKing
3 years, 3 months ago
On actual test as of Jan 14 2022
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago