Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Amazon Exam SCS-C02 Topic 5 Question 36 Discussion

Actual exam question for Amazon's SCS-C02 exam
Question #: 36
Topic #: 5
[All SCS-C02 Questions]

A company wants to receive automated email notifications when AWS access keys from developer AWS accounts are detected on code repository sites.

Which solution will provide the required email notifications?

Show Suggested Answer Hide Answer
Suggested Answer: A

The solution to receiving automated email notifications when AWS access keys are detected on code repository sites is to use Amazon EventBridge with Amazon GuardDuty findings. Specifically, creating an EventBridge rule that targets Amazon GuardDuty findings, particularly the UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration finding type, allows for the detection of potential unauthorized use or exposure of AWS credentials. When such a finding is detected, EventBridge can then trigger an action to send a notification via Amazon Simple Notification Service (Amazon SNS). By configuring an SNS topic to send emails, stakeholders can be promptly informed of such security incidents. This approach leverages AWS's native security and monitoring services to provide timely alerts with minimal operational overhead, ensuring that the company can respond quickly to potential security breaches involving exposed AWS credentials.


Contribute your Thoughts:

Brunilda
24 days ago
I wonder if the company has considered setting up a dedicated email address just for these notifications. That way, they can keep their regular inbox clean and organized. *winks*
upvoted 0 times
...
Stanton
28 days ago
Hey, does anyone else feel like they're being watched? I mean, with all these AWS access keys floating around, it's like Big Brother is always watching. *chuckles*
upvoted 0 times
...
Farrah
29 days ago
Hmm, I'm torn between A and C. Guess I'll have to flip a coin on this one. Or maybe I'll just ask the AWS support team for a recommendation.
upvoted 0 times
Misty
7 days ago
True, C could also be a good choice. It's always good to get a second opinion from the AWS support team.
upvoted 0 times
...
Justine
12 days ago
You could also consider C as an alternative option for email notifications.
upvoted 0 times
...
Barney
14 days ago
I agree, A seems like the most suitable solution for this scenario.
upvoted 0 times
...
Jaime
16 days ago
I think A is the best option. It will provide the required email notifications.
upvoted 0 times
...
...
Rashad
1 months ago
B is an interesting approach, but I'm not sure if it's the most efficient way to handle this. Seems like a lot of manual work.
upvoted 0 times
Salley
2 days ago
D) Implement new anomaly detection software. Ingest AWS CloudTrail logs. Configure monitoring for ConsoleLogin events in the AWS Management Console. Configure email notifications from the anomaly detection software.
upvoted 0 times
...
Susy
5 days ago
C) Create an Amazon EventBridge rule that reacts to AWS Health events that have a value of Risk for the service category Configure email notifications by using Amazon Simple Notification Service (Amazon SNS).
upvoted 0 times
...
Hermila
22 days ago
A) Create an Amazon EventBridge rule to send Amazon Simple Notification Service (Amazon SNS) email notifications for Amazon GuardDuty UnauthorizedAccesslAMUser/lnstanceCredentialExfiltration OutsideAWS findings.
upvoted 0 times
...
...
Nobuko
1 months ago
D looks promising, but I'm not sure if it's overkill for this use case. Maybe a combination of A and C could work?
upvoted 0 times
Buck
8 days ago
Sina: A and C combined could be a good solution for this.
upvoted 0 times
...
Tasia
14 days ago
User 3: What about C? It also involves email notifications.
upvoted 0 times
...
Sina
21 days ago
User 2: Yeah, A seems like a good option for this use case.
upvoted 0 times
...
Sanjuana
24 days ago
User 1: I think A could work well for automated email notifications.
upvoted 0 times
...
...
Lashonda
2 months ago
A seems like a good option, but I'm not sure if it covers all the bases. Might need to look into the other solutions as well.
upvoted 0 times
Francine
7 days ago
C) Create an Amazon EventBridge rule that reacts to AWS Health events that have a value of Risk for the service category Configure email notifications by using Amazon Simple Notification Service (Amazon SNS).
upvoted 0 times
...
Antione
7 days ago
D) Implement new anomaly detection software. Ingest AWS CloudTrail logs. Configure monitoring for ConsoleLogin events in the AWS Management Console. Configure email notifications from the anomaly detection software.
upvoted 0 times
...
Erasmo
10 days ago
B) Change the AWS account contact information for the Operations type to a separate email address. Periodically poll this email address for notifications.
upvoted 0 times
...
Ashlee
1 months ago
A) Create an Amazon EventBridge rule to send Amazon Simple Notification Service (Amazon SNS) email notifications for Amazon GuardDuty UnauthorizedAccesslAMUser/lnstanceCredentialExfiltration OutsideAWS findings.
upvoted 0 times
...
...
Dortha
2 months ago
I agree with Larae. Option A seems to be the most efficient and effective solution for receiving automated email notifications.
upvoted 0 times
...
Larae
2 months ago
I think option A is the best solution because it uses Amazon EventBridge and Amazon SNS for email notifications.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77