exam questions

Exam AWS Certified SysOps Administrator - Associate All Questions

View all questions & answers for the AWS Certified SysOps Administrator - Associate exam

Exam AWS Certified SysOps Administrator - Associate topic 1 question 38 discussion

A company has a private Amazon S3 bucket that contains sensitive information. A SysOps administrator needs to keep logs of the IP addresses from authentication failures that result from attempts to access objects in the bucket. The logs must be stored so that they cannot be overwritten or deleted for 90 days.
Which solution will meet these requirements?

  • A. Create an AWS CloudTrail trail. Configure the log files to be saved to Amazon CloudWatch Logs. Configure the log group with a retention period of 90 days.
  • B. Create an AWS CloudTrail trail. Configure the log files to be saved to a different S3 bucket. Turn on CloudTrail log file integrity validation for 90 days.
  • C. Turn on access logging for the S3 bucket. Configure the access logs to be saved to Amazon CloudWatch Logs. Configure the log group with a retention period of 90 days.
  • D. Turn on access logging for the S3 bucket. Configure the access logs to be saved in a second S3 bucket. Turn on S3 Object Lock on the second S3 bucket, and configure a default retention period of 90 days.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kati2k22cz
Highly Voted 2 years, 7 months ago
Selected Answer: D
D. Learn more here: https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html
upvoted 11 times
...
princajen
Highly Voted 2 years, 7 months ago
I would have thought is A, but after reading I found this: "CloudTrail does not deliver logs for requests that fail authentication (in which the provided credentials are not valid). However, it does include logs for requests in which authorization fails (AccessDenied) and requests that are made by anonymous users." https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html
upvoted 10 times
cosmogen
2 years, 4 months ago
You are right, but read again the question:”keep logs of the IP addresses from authentication failures” that “result from attempts to access objects in the bucket” . “That result from attempts to access objects in the bucket” , for me it’s mean authorization fails(AccessDenied).So, for me B,C,D technically are not possible. Vote for A
upvoted 3 times
...
...
Dinya_jui
Most Recent 3 months, 3 weeks ago
Selected Answer: D
I would have thought is A, but after reading I found this: "CloudTrail does not deliver logs for requests that fail authentication (in which the provided credentials are not valid). However, it does include logs for requests in which authorization fails (AccessDenied) and requests that are made by anonymous users." https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html
upvoted 1 times
...
numark
5 months ago
D: S3 Access Logging allows you to capture details of requests made to your S3 bucket, including failed attempts. This is critical for tracking authentication failures.By configuring the access logs to be saved to a second S3 bucket, you can separate the logs from the sensitive data in the original bucket, adding an extra layer of security and compliance.S3 Object Lock can be used to prevent object versions from being deleted or overwritten for a specified retention period. By turning on S3 Object Lock and setting the retention period to 90 days, you ensure that the access logs are immutable for the required duration.S3 Object Lock enforces a Write Once, Read Many (WORM) model, which is ideal for compliance and security use cases.
upvoted 1 times
...
joshnort
1 year, 1 month ago
Selected Answer: D
"CloudTrail does not deliver logs for requests that fail authentication (in which the provided credentials are not valid). However, it does include logs for requests in which authorization fails (AccessDenied) and requests that are made by anonymous users." https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html#:~:text=CloudTrail%20does%20not%20deliver%20logs%20for%20requests%20that%20fail%20authentication%20(in%20which%20the%20provided%20credentials%20are%20not%20valid).%20However%2C%20it%20does%20include%20logs%20for%20requests%20in%20which%20authorization%20fails%20(AccessDenied)%20and%20requests%20that%20are%20made%20by%20anonymous%20users.
upvoted 4 times
...
Rabbit117
1 year, 1 month ago
Selected Answer: D
I think D is correct. Its the only option which prevents the logs from being deleted. Cloud watch log retention will prevent the logs from expiring, but they can still be deleted.
upvoted 3 times
...
Learning4life
1 year, 2 months ago
Selected Answer: D
Simple answer is D. S3 authentication failures are not logged by Cloud Trail. See chart in link. https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html Turning on S3object lock, protects against accidental deletion. See link https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock.html
upvoted 5 times
...
ogogundare
1 year, 3 months ago
Selected Answer: D
D is the correct answer to keep tracks of access logging for s3 bucket
upvoted 2 times
...
tamng
1 year, 3 months ago
D is Correct not A
upvoted 1 times
...
Vinsmoke
1 year, 6 months ago
Selected Answer: D
B doesn't make sense with the log file integrity for 90 days bit - you don't configure log file integrity to only apply for a period of time.
upvoted 2 times
...
callspace
1 year, 6 months ago
Selected Answer: B
Looks like it is B. Server access logging provides detailed records for the requests that are made to a bucket. Server access logs are useful for many applications. For example, access log information can be useful in security and access audits. It can also help you learn about your customer base and understand your Amazon S3 bill. But Cloud Trail is capable of recording theIPs.So IPs recording, CloudTrail log file integrity validation for 90 days
upvoted 1 times
...
satamex
1 year, 8 months ago
Its simple straightforward question . D it is
upvoted 1 times
...
Christina666
1 year, 9 months ago
Selected Answer: D
Option D is the most appropriate solution because it covers the specific requirements mentioned in the question. By turning on access logging for the S3 bucket, you can capture the IP addresses from authentication failures. You then configure these access logs to be saved in a separate S3 bucket, ensuring data durability and separation from the source bucket. By enabling S3 Object Lock on the second S3 bucket and setting a default retention period of 90 days, you ensure that the logs cannot be deleted or overwritten for the specified duration.
upvoted 8 times
...
noahsark
1 year, 11 months ago
Selected Answer: B
maybe Create an AWS CloudTrail trail. Configure the log files to be saved to a different S3 bucket. Turn on CloudTrail log file integrity validation for 90 days. Notes: D is wrong because S3 buckets with S3 Object Lock can't be used as destination buckets for server access logs. https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
upvoted 1 times
Gomer
1 year, 11 months ago
Integrity validation doesn't stop someone form changing/deleting logs, it just detects it. The real solution requires protection of the files through versioning or object lock. After wasting a day analyzing all the solutions, I found real problems with each one as I listed. That is why the voting is fairly balanced. Something is wrong with the responses given
upvoted 1 times
...
...
Gomer
1 year, 11 months ago
NOT A: Can't configure CloudTrail to store logs in CloudWatch Logs. CloudTrail uses S3 bucket. CloudWatch Logs is not applicable. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html NOT B: "Integrity validation" is only designed to detect changes or deletions of CloudTrail logs. It depends on other security measures to block this. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-log-file-validation-intro.html NOT C: Server access logging only delivers access logs for a source bucket to a target bucket. CloudWatch log group is not applicable. https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.htm NOT D: "S3 buckets with S3 Object Lock can't be used as destination buckets for server access logs." https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-overview.html https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
upvoted 4 times
Gomer
1 year, 11 months ago
Both "A" and "C" are clearly not possible, and are excluded (IMHO). However, "B" and "D" also appear to be excluded for reasons cited. I do lean towards "D" because one clear requirement is to block log file deletion, not just detect it or automate it after 90 days. IMHO the real solution (not listed) would create a CloudTrail trail that logs S3 Data Events in seperate bucket, enable S3 Object Lock on that bucket with a retention period of 90 days, and enable Integrity Validation to detect any possible changes/deletions. Then I'd also figure out a lifecycle policy or some method to delete the logs sometimes after the 90 day requirement.
upvoted 1 times
...
...
vherman
2 years ago
Selected Answer: B
By creating a CloudTrail trail, you can log all API calls made to the S3 bucket, including authentication failures. The logs can be saved to a separate S3 bucket to isolate them from the main bucket and provide an additional layer of security. Turning on CloudTrail log file integrity validation ensures that the logs cannot be modified or deleted without detection. The retention period for the logs can be set to 90 days to meet the requirements specified in the question.
upvoted 1 times
...
braveheart22
2 years, 1 month ago
This question is really tricky, but after reding the question very carefully, I will definitely go with BBBBBB.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago