A DevOps engineer wants to implement an automated response that will occur if flaws Trusted Advisor detects an IAM access key in a public source code repository. The automated response must delete the exposed access key and must notify the security team. Which solution will meet these requirements? A. Create an flaws Lambda function to delete the 1AM access key. Configure flaws CloudTrail logs to stream to Amazon CloudWatch Logs. Create a CloudWatch Logs metric filter for the AWS_RISK_CREDENTIALS_EXPOSED event with two actions. First, run the Lambda function. Second, use Amazon Simple Notification Service (Amazon SNS) to send a notification to the security team. B. Create an flaws Lambda function to delete the IAM access key. Create an flaws Config rule for changes to "flaws.trustedadvisor" and the "Exposed Access Keys" status with two actions. First, run the Lambda function. Second, use Amazon Simple Notification Service (Amazon SNS) to send a notification to the security team. C. Create an flaws Lambda function that deletes the IAM access key and then uses Amazon Simple Notification Service (Amazon SNS) to notify the security team. Create an flaws Personal Health Dashboard rule for the AWS_RISK_CREDENTIALS_EXPOSED event. Set the target of the Personal Health Dashboard rule to the ARN of the Lambda function. D. Create an flaws Lambda function that deletes the IAM access key. Create an Amazon EventBridge (Amazon CloudWatch Events) rule with an "flaws.trustedadvisor" event source and the "Exposed Access Keys" status. Set the EventBridge (CloudWatch Events) rule to target the Lambda function and an Amazon Simple Notification Service (Amazon SNS) topic that notifies the security team. Â Correct Answer: D This question is in DOP-C01 exam For getting AWS DevOps Engineer - Professional Certificate
Please login or Register to submit your answer