exam questions

Exam AWS Certified Solutions Architect - Professional SAP-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Professional SAP-C02 exam

Exam AWS Certified Solutions Architect - Professional SAP-C02 topic 1 question 57 discussion

A company with several AWS accounts is using AWS Organizations and service control policies (SCPs). An administrator created the following SCP and has attached it to an organizational unit (OU) that contains AWS account 1111-1111-1111:



Developers working in account 1111-1111-1111 complain that they cannot create Amazon S3 buckets. How should the administrator address this problem?

  • A. Add s3:CreateBucket with “Allow” effect to the SCP.
  • B. Remove the account from the OU, and attach the SCP directly to account 1111-1111-1111.
  • C. Instruct the developers to add Amazon S3 permissions to their IAM entities.
  • D. Remove the SCP from account 1111-1111-1111.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Atila50
Highly Voted 2 years, 2 months ago
Selected Answer: C
SCP doesn’t grant permission
upvoted 23 times
c73bf38
2 years ago
Per the DOCS: Service control policies (SCPs) are a type of organization policy that you can use to manage permissions in your organization. SCPs offer central control over the maximum available permissions for all accounts in your organization. SCPs help you to ensure your accounts stay within your organization’s access control guidelines. SCPs are available only in an organization that has all features enabled. SCPs aren't available if your organization has enabled only the consolidated billing features. For instructions on enabling SCPs, see Enabling and disabling policy types.
upvoted 7 times
c73bf38
2 years ago
SCPs alone are not sufficient to granting permissions to the accounts in your organization. No permissions are granted by an SCP. An SCP defines a guardrail, or sets limits, on the actions that the account's administrator can delegate to the IAM users and roles in the affected accounts. The administrator must still attach identity-based or resource-based policies to IAM users or roles, or to the resources in your accounts to actually grant permissions. The effective permissions are the logical intersection between what is allowed by the SCP and what is allowed by the IAM and resource-based policies.
upvoted 12 times
...
...
...
zhangyu20000
Highly Voted 2 years, 2 months ago
C is correct SCP policy allow everything except cloudtrail. SCP is boundary but it does not give allow to IAM users. You have to configure allow for every IAM
upvoted 13 times
...
29fb203
Most Recent 1 week, 5 days ago
Selected Answer: A
IAM permissions do not override SCPs. Even if developers have IAM policies allowing s3:CreateBucket, an SCP restriction will still block it unless explicitly allowed.
upvoted 1 times
vmia159
1 week, 1 day ago
Your statement is correct but the policy does not deny action on S3. So the SCP is not causing any problems. So it is C.
upvoted 1 times
...
...
longlehoang
1 month ago
Selected Answer: A
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "*", "Resource": "*" }, { "Sid": "DenyCloudTrail", "Effect": "Deny", "Action": "cloudtrail:*", "Resource": "*" }, { "Sid": "AllowS3CreateBucket", "Effect": "Allow", "Action": "s3:CreateBucket", "Resource": "*" } ] }
upvoted 1 times
...
amministrazione
6 months, 2 weeks ago
B. Register a block of customer-owned public IP addresses in the AWS account. Create Elastic IP addresses from the address block and assign them to the NAT gateways in the VPC.
upvoted 1 times
helloworldabc
6 months, 2 weeks ago
just C
upvoted 1 times
...
...
gofavad926
1 year ago
Selected Answer: C
C, SCP is just a distractor, the users need direct permissions
upvoted 3 times
...
8608f25
1 year, 1 month ago
Selected Answer: C
The problem described does not originate from the Service Control Policy (SCP) itself based on the SCP content provided. The SCP allows all actions ("Action": "") except for actions related to AWS CloudTrail ("Action": "CloudTrail:"), which are explicitly denied. Therefore, the inability for developers to create Amazon S3 buckets is not due to this SCP, as the SCP does not restrict S3 actions. Given the situation, the correct way to address the developers’ inability to create Amazon S3 buckets would be: * C. Instruct the developers to add Amazon S3 permissions to their IAM entities. Option C is the correct action because the issue likely stems from the IAM permissions (or lack thereof) assigned to the developers’ IAM entities (users, groups, or roles). IAM permissions are required to perform actions within AWS accounts, such as creating S3 buckets. If developers lack the necessary IAM permissions, they would not be able to create S3 buckets regardless of the SCP settings.
upvoted 2 times
...
ninomfr64
1 year, 2 months ago
Selected Answer: C
The SCP in the scenario is allowing any actions with the exception of cloudtrail. Thus, the SCP is not preventing user to create S3 bucket. If the user cannot create a bucket, then the user IAM user/role is missing permissions to create S3 bucket.
upvoted 3 times
...
shaaam80
1 year, 3 months ago
Selected Answer: C
Answer C.
upvoted 1 times
...
NikkyDicky
1 year, 8 months ago
Selected Answer: C
it's a C
upvoted 1 times
...
javitech83
1 year, 8 months ago
Selected Answer: C
C is correct
upvoted 1 times
...
SkyZeroZx
1 year, 9 months ago
Selected Answer: C
I just wanted to add my vote to the mix to hopefully drown out the wrong votes. Its definitely C. SCP is only a guardrail, it doesn't actually grant access. So the users would need to be given s3 access separately. And to address the wrong answer, A isn't correct because creating an s3 bucket is not a cloudtrail action. Being denied cloudtrail wouldn't deny s3 actions.
upvoted 2 times
...
bhanus
1 year, 9 months ago
C is the answer. SCP DONT grant permissions. They just set boundaries on what account is capable of giving access to all users. For example, we applied a SCP on an OU that has account A. This SCP has S3fullAWSaccess. This does NOT mean that any IAM user can perform any S3 action. You still need to explicitly define IAM permissions for user to perform action on S3. This is called whitelisting. Another example, You wrote an SCP that DENIES S3 access and applied it to an OU that has account B. Now Lets say ROOT user of Account B (who got admin previleges) tries to create S3 bucket, they get DENIED error as SCP has already set a bounday saying NOONE in this OU can access S3
upvoted 2 times
...
Asds
1 year, 9 months ago
Selected Answer: C
Need to deal with iam policy auth now
upvoted 1 times
Asds
1 year, 9 months ago
C is right
upvoted 1 times
...
...
leehjworking
1 year, 10 months ago
I am not sure the given situation is possible. When I tested, member (1111-1111-1111) could create bucket without any policy which can be attached or detached by the oneself.
upvoted 2 times
...
leehjworking
1 year, 10 months ago
Are developers allowed to modify their IAM entities in the situation of option C? If so, I am not sure this is the best practice.
upvoted 2 times
...
mfsec
1 year, 11 months ago
Selected Answer: C
C is correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago