Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified Solutions Architect - Associate SAA-C03 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Associate SAA-C03 exam

Exam AWS Certified Solutions Architect - Associate SAA-C03 topic 1 question 179 discussion

A solutions architect needs to securely store a database user name and password that an application uses to access an Amazon RDS DB instance. The application that accesses the database runs on an Amazon EC2 instance. The solutions architect wants to create a secure parameter in AWS Systems Manager Parameter Store.

What should the solutions architect do to meet this requirement?

  • A. Create an IAM role that has read access to the Parameter Store parameter. Allow Decrypt access to an AWS Key Management Service (AWS KMS) key that is used to encrypt the parameter. Assign this IAM role to the EC2 instance.
  • B. Create an IAM policy that allows read access to the Parameter Store parameter. Allow Decrypt access to an AWS Key Management Service (AWS KMS) key that is used to encrypt the parameter. Assign this IAM policy to the EC2 instance.
  • C. Create an IAM trust relationship between the Parameter Store parameter and the EC2 instance. Specify Amazon RDS as a principal in the trust policy.
  • D. Create an IAM trust relationship between the DB instance and the EC2 instance. Specify Systems Manager as a principal in the trust policy.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Buruguduystunstugudunstuy
Highly Voted 1 year, 11 months ago
Selected Answer: A
CORRECT Option A To securely store a database user name and password in AWS Systems Manager Parameter Store and allow an application running on an EC2 instance to access it, the solutions architect should create an IAM role that has read access to the Parameter Store parameter and allow Decrypt access to an AWS KMS key that is used to encrypt the parameter. The solutions architect should then assign this IAM role to the EC2 instance. This approach allows the EC2 instance to access the parameter in the Parameter Store and decrypt it using the specified KMS key while enforcing the necessary security controls to ensure that the parameter is only accessible to authorized parties.
upvoted 21 times
Buruguduystunstugudunstuy
1 year, 11 months ago
Option B, would not be sufficient, as IAM policies cannot be directly attached to EC2 instances. Option C, would not be a valid solution, as the Parameter Store parameter and the EC2 instance are not entities that can be related through an IAM trust relationship. Option D, would not be a valid solution, as the trust policy would not allow the EC2 instance to access the parameter in the Parameter Store or decrypt it using the specified KMS key.
upvoted 9 times
...
...
sdasdawa
Highly Voted 2 years ago
Selected Answer: A
Agree with A, IAM role is for services (EC2 for example) IAM policy is more for users and groups
upvoted 9 times
...
lofzee
Most Recent 5 months, 3 weeks ago
A all day. Don't even need to read the other answers. You can't attach a policy to EC2. You have to attach a role.
upvoted 2 times
...
awsgeek75
10 months, 1 week ago
Selected Answer: A
policy needs to be assigned to something so B is inaccurate CD are just made up things
upvoted 2 times
...
TariqKipkemei
1 year, 2 months ago
Selected Answer: A
Create an IAM role that has read access to the Parameter Store parameter. Allow Decrypt access to an AWS Key Management Service (AWS KMS) key that is used to encrypt the parameter. Assign this IAM role to the EC2 instance
upvoted 2 times
...
Guru4Cloud
1 year, 3 months ago
Selected Answer: A
CORRECT Option A
upvoted 2 times
...
cookieMr
1 year, 4 months ago
Selected Answer: A
By creating an IAM role with read access to the Parameter Store parameter and Decrypt access to the associated AWS KMS key, the EC2 will have the necessary permissions to securely retrieve and decrypt the database user name and password from the Parameter Store. This approach ensures that the sensitive information is protected and can be accessed only by authorized entities. Answers B, C, and D are not correct because they do not provide a secure way to store and retrieve the database user name and password from the Parameter Store. IAM policies, trust relationships, and associations with the DB instance are not the appropriate mechanisms for securely managing sensitive credentials in this scenario. Answer A is the correct choice as it involves creating an IAM role with the necessary permissions and assigning it to the EC2 instance to access the Parameter Store securely.
upvoted 3 times
...
cheese929
1 year, 6 months ago
Selected Answer: A
A is correct
upvoted 2 times
...
kruasan
1 year, 6 months ago
Selected Answer: A
By creating an IAM role and assigning it to the EC2 instance, the application running on the EC2 instance can access the Parameter Store parameter securely without the need for hard-coding the database user name and password in the application code. The IAM role should have read access to the Parameter Store parameter and Decrypt access to an AWS KMS key that is used to encrypt the parameter to ensure that the parameter is protected at rest.
upvoted 2 times
...
HayLLlHuK
1 year, 10 months ago
There should be the Decrypt access to KMS. "If you choose the SecureString parameter type when you create your parameter, Systems Manager uses AWS KMS to encrypt the parameter value." https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html IAM role - for EC2
upvoted 2 times
...
BENICE
1 year, 11 months ago
A -- is correct option
upvoted 2 times
...
career360guru
1 year, 11 months ago
Option A.
upvoted 2 times
...
k1kavi1
1 year, 11 months ago
Selected Answer: A
A is correct
upvoted 2 times
...
Shasha1
1 year, 11 months ago
Answer A Create an IAM role that has read access to the Parameter Store parameter. Allow Decrypt access to an AWS Key Management Service (AWS KMS) key that is used to encrypt the parameter. Assign this IAM role to the EC2 instance. This solution will allow the application to securely access the database user name and password stored in the parameter store.
upvoted 2 times
...
[Removed]
1 year, 11 months ago
Selected Answer: B
i think policy
upvoted 1 times
turalmth
1 year, 11 months ago
can you attach policy to ec2 directly ?
upvoted 2 times
...
[Removed]
1 year, 11 months ago
https://aws.amazon.com/blogs/compute/managing-secrets-for-amazon-ecs-applications-using-parameter-store-and-iam-roles-for-tasks/
upvoted 1 times
JayBee65
1 year, 10 months ago
This link gives the example "Walkthrough: Securely access Parameter Store resources with IAM roles for tasks" - essentially A above. It doe snot show how this can be done using a policy (B) alone.
upvoted 2 times
...
...
[Removed]
1 year, 11 months ago
Access to Parameter Store is enabled by IAM policies and supports resource level permissions for access. An IAM policy that grants permissions to specific parameters or a namespace can be used to limit access to these parameters. CloudTrail logs, if enabled for the service, record any attempt to access a parameter.
upvoted 1 times
...
pentium75
11 months ago
IAM Policies can be attached to IAM roles, and EC2 instances can be allowed to use IAM roles. You can't attach an IAM policy to an EC2 instance.
upvoted 2 times
...
...
EKA_CloudGod
2 years ago
Selected Answer: A
A. Attach IAM role to EC2 Instance https://aws.amazon.com/blogs/security/digital-signing-asymmetric-keys-aws-kms/
upvoted 2 times
...
babaxoxo
2 years ago
Selected Answer: A
Attach IAM role to EC2 Instance profile
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...