A security team is working on a solution that will use Amazon EventBridge (Amazon CloudWatch Events) to
monitor new Amazon S3 objects. The solution will monitor for public access and for changes to any S3 bucket
policy or setting that result in public access. The security team configures EventBridge to watch for specific
API calls that are logged from AWS CloudTrail. EventBridge has an action to send an email notification
through Amazon Simple Notification Service (Amazon SNS) to the security team immediately with details of
the API call.
Specifically, the security team wants EventBridge to watch for the s3:PutObjectAcl, s3:DeleteBucketPolicy,
and s3:PutBucketPolicy API invocation logs from CloudTrail. While developing the solution in a single
account, the security team discovers that the s3:PutObjectAcl API call does not invoke an EventBridge event.
However, the s3:DeleteBucketPolicy API call and the s3:PutBucketPolicy API call do invoke an event.
The security team has enabled CloudTrail for AWS management events with a basic configuration in the AWS
Region in which EventBridge is being tested. Verification of the EventBridge event pattern indicates that the
pattern is set up correctly. The security team must implement a solution so that the s3:PutObjectAcl API call
will invoke an EventBridge event. The solution must not generate false notifications.
Which solution will meet these requirements?
A company manages multiple IAM accounts using IAM Organizations. The company's security team notices
that some member accounts are not sending IAM CloudTrail logs to a centralized Amazon S3 logging bucket.
The security team wants to ensure there is at least one trail configured (or all existing accounts and for any
account that is created in the future.
Which set of actions should the security team implement to accomplish this?
A company needs to follow security best practices to deploy resources from an AWS CloudFormation
template. The CloudFormation template must be able to configure sensitive database credentials. The company already uses AWS Key Management Service (AWS KMS) and AWS Secrets Manager.
Which solution will meet the requirements?
A company purchased a subscription to a third-party cloud security scanning solution that integrates with
AWS Security Hub. A security engineer needs to implement a solution that will remediate the findings
from the third-party scanning solution automatically.
Which solution will meet this requirement?
© Copyrights TheExamsLab 2025. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the TheExamsLab.