exam questions

Exam AWS Certified Solutions Architect - Associate SAA-C03 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Associate SAA-C03 exam

Exam AWS Certified Solutions Architect - Associate SAA-C03 topic 1 question 327 discussion

A solutions architect must secure a VPC network that hosts Amazon EC2 instances. The EC2 instances contain highly sensitive data and run in a private subnet. According to company policy, the EC2 instances that run in the VPC can access only approved third-party software repositories on the internet for software product updates that use the third party’s URL. Other internet traffic must be blocked.

Which solution meets these requirements?

  • A. Update the route table for the private subnet to route the outbound traffic to an AWS Network Firewall firewall. Configure domain list rule groups.
  • B. Set up an AWS WAF web ACL. Create a custom set of rules that filter traffic requests based on source and destination IP address range sets.
  • C. Implement strict inbound security group rules. Configure an outbound rule that allows traffic only to the authorized software repositories on the internet by specifying the URLs.
  • D. Configure an Application Load Balancer (ALB) in front of the EC2 instances. Direct all outbound traffic to the ALB. Use a URL-based rule listener in the ALB’s target group for outbound access to the internet.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bhawesh
Highly Voted 1 year, 4 months ago
Selected Answer: A
Correct Answer A. Send the outbound connection from EC2 to Network Firewall. In Network Firewall, create stateful outbound rules to allow certain domains for software patch download and deny all other domains. https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-examples.html#suricata-example-domain-filtering
upvoted 15 times
Guru4Cloud
9 months, 3 weeks ago
Option A uses a network firewall which is overkill for instance-level rules.
upvoted 2 times
...
...
UnluckyDucky
Highly Voted 1 year, 3 months ago
Selected Answer: A
Can't use URLs in outbound rule of security groups. URL Filtering screams Firewall.
upvoted 11 times
...
TheFivePips
Most Recent 3 months, 4 weeks ago
Selected Answer: A
Security Groups operate at the transport layer (Layer 4) of the OSI model and are primarily concerned with controlling traffic based on IP addresses, ports, and protocols. They do not have the capability to inspect or filter traffic based on URLs. The solution to restrict outbound internet traffic based on specific URLs typically involves using a proxy or firewall that can inspect the application layer (Layer 7) of the OSI model, where URL information is available. AWS Network Firewall operates at the network and application layers, allowing for more granular control, including the ability to inspect and filter traffic based on domain names or URLs. By configuring domain list rule groups in AWS Network Firewall, you can specify which URLs are allowed for outbound traffic. This option is more aligned with the requirement of allowing access to approved third-party software repositories based on their URLs.
upvoted 5 times
...
awsgeek75
5 months, 3 weeks ago
Selected Answer: A
https://aws.amazon.com/network-firewall/features/ "Web filtering: AWS Network Firewall supports inbound and outbound web filtering for unencrypted web traffic. For encrypted web traffic, Server Name Indication (SNI) is used for blocking access to specific sites. SNI is an extension to Transport Layer Security (TLS) that remains unencrypted in the traffic flow and indicates the destination hostname a client is attempting to access over HTTPS. In addition, **AWS Network Firewall can filter fully qualified domain names (FQDN).**" Always use an AWS product if the advertisement meets the use case.
upvoted 4 times
...
farnamjam
5 months, 3 weeks ago
Selected Answer: A
AWS Network Firewall • Protect your entire Amazon VPC • From Layer 3 to Layer 7 protection • Any direction, you can inspect Traffic filtering: Allow, drop, or alert for the traffic that matches the rules, • Active flow inspection to intrusion prevention
upvoted 2 times
...
Subhrangsu
6 months, 1 week ago
D not possible?
upvoted 1 times
awsgeek75
5 months, 3 weeks ago
ALB is for inbound traffic. D is not possible as it is suggesting to direct OUTBOUND traffic.
upvoted 4 times
...
...
Cyberkayu
6 months, 1 week ago
Selected Answer: A
AWS network firewall is stateful, providing control and visibility to Layer 3-7 network traffic, thus cover the application too
upvoted 2 times
...
TariqKipkemei
8 months, 2 weeks ago
Selected Answer: A
Just tried on the console to set up an outbound rule, and URLs cannot be used as a destination. I will opt for A.
upvoted 2 times
...
Guru4Cloud
9 months, 3 weeks ago
Selected Answer: C
Implement strict inbound security group rules Configure an outbound security group rule to allow traffic only to the approved software repository URLs The key points: Highly sensitive EC2 instances in private subnet that can access only approved URLs Other internet access must be blocked Security groups act as a firewall at the instance level and can control both inbound and outbound traffic.
upvoted 2 times
pentium75
5 months, 3 weeks ago
Security Groups work with CIDR ranges, not URLs.
upvoted 3 times
...
...
kelvintoys93
1 year ago
Isnt private subnet not connectible to internet at all, unless with a NAT gateway?
upvoted 4 times
...
VeseljkoD
1 year, 3 months ago
Selected Answer: A
We can't specifu URL in outbound rule of security group. Create free tier AWS account and test it.
upvoted 2 times
...
Leo301
1 year, 3 months ago
Selected Answer: C
CCCCCCCCCCC
upvoted 1 times
pentium75
5 months, 3 weeks ago
Security Groups with IP ranges, not URLs
upvoted 2 times
...
...
Brak
1 year, 3 months ago
It can't be C. You cannot use URLs in the outbound rules of a security group.
upvoted 3 times
...
johnmcclane78
1 year, 3 months ago
Option C is the best solution to meet the requirements of this scenario. Implementing strict inbound security group rules that only allow traffic from approved sources can help secure the VPC network that hosts Amazon EC2 instances. Additionally, configuring an outbound rule that allows traffic only to the authorized software repositories on the internet by specifying the URLs will ensure that only approved third-party software repositories can be accessed from the EC2 instances. This solution does not require any additional AWS services and can be implemented using VPC security groups. Option A is not the best solution as it involves the use of AWS Network Firewall, which may introduce additional operational overhead. While domain list rule groups can be used to block all internet traffic except for the approved third-party software repositories, this solution is more complex than necessary for this scenario.
upvoted 2 times
pentium75
5 months, 3 weeks ago
How do you use a Security Group to allow access to https://server.com/repoa while denying access to https://server.com/repob ? Security Groups work with IP ranges.
upvoted 2 times
...
...
Steve_4542636
1 year, 3 months ago
Selected Answer: C
In the security group, only allow inbound traffic originating from the VPC. Then only allow outbound traffic with a whitelisted IP address. The question asks about blocking EC2 instances, which is best for security groups since those are at the EC2 instance level. A network firewall is at the VPC level, which is not what the question is asking to protect.
upvoted 1 times
pentium75
5 months, 3 weeks ago
Security Groups work with IP ranges, not URLs.
upvoted 1 times
...
Theodorz
1 year, 3 months ago
Is Security Group able to allow a specific URL? According to https://docs.aws.amazon.com/vpc/latest/userguide/VPC_SecurityGroups.html, I cannot find such description.
upvoted 2 times
...
...
KZM
1 year, 4 months ago
I am confused that It seems both options A and C are valid solutions.
upvoted 3 times
Mia2009687
11 months, 2 weeks ago
I think C is in private subnet. Even with security group, it could not go public to download the software.
upvoted 1 times
...
Zohx
1 year, 3 months ago
Same here - why is C not a valid option?
upvoted 2 times
pentium75
5 months, 3 weeks ago
Because you want to filter based on URLs, not IP ranges.
upvoted 2 times
...
Karlos99
1 year, 3 months ago
And it is easier to do it at the VPC level
upvoted 2 times
...
Karlos99
1 year, 3 months ago
And it is easier to do it at the level
upvoted 2 times
...
...
ruqui
1 year ago
C is not valid. Security groups can allow only traffic from specific ports and/or IPs, you can't use an URL. Correct answer is A
upvoted 3 times
...
...
jennyka76
1 year, 4 months ago
Answer - A https://aws.amazon.com/premiumsupport/knowledge-center/ec2-al1-al2-update-yum-without-internet/
upvoted 6 times
asoli
1 year, 3 months ago
Although the answer is A, the link you provided here is not related to this question. The information about "Network Firewall" and how it can help this issue is here: https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-examples.html#suricata-example-domain-filtering (thanks to "@Bhawesh" to provide the link in their answer)
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago