A company asks a SysOps administrator to ensure that flaws CloudTrail files are not tampered with after they are created. Currently, the company uses flaws Identity and Access Management (IAM) to restrict access to specific trails. The company’s security team needs the ability to trace the integrity of each file. What is the MOST operationally efficient solution that meets these requirements?

QuestionsCategory: SOA-C02A company asks a SysOps administrator to ensure that flaws CloudTrail files are not tampered with after they are created. Currently, the company uses flaws Identity and Access Management (IAM) to restrict access to specific trails. The company’s security team needs the ability to trace the integrity of each file. What is the MOST operationally efficient solution that meets these requirements?
Admin Staff asked 7 months ago
A company asks a SysOps administrator to ensure that flaws CloudTrail files are not tampered with after they are created. Currently, the company uses flaws
Identity and Access Management (IAM) to restrict access to specific trails. The company's security team needs the ability to trace the integrity of each file.
What is the MOST operationally efficient solution that meets these requirements?

A. Create an Amazon EventBridge (Amazon CloudWatch Events) rule that invokes an flaws Lambda function when a new file is delivered. Configure the Lambda function to compute an MD5 hash check on the file and store the result in an Amazon DynamoDB table. The security team can use the values that are stored in DynamoDB to verify the integrity of the delivered files.

B. Create an flaws Lambda function that is invoked each time a new file is delivered to the CloudTrail bucket. Configure the Lambda function to compute an MD5 hash check on the file and store the result as a tag in an Amazon 53 object. The security team can use the information in the tag to verify the integrity of the delivered files.

C. Enable the CloudTrail file integrity feature on an Amazon S3 bucket. Create an IAM policy that grants the security team access to the file integrity logs that are stored in the S3 bucket.

D. Enable the CloudTrail file integrity feature on the trail. The security team can use the digest file that is created by CloudTrail to verify the integrity of the delivered files.








 

Correct Answer: C

This question is in SOA-C02 exam
For getting AWS Certified SysOps Administrator - Associate

Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.