問題一覧
1
{ "Action": [ "s3:DeleteObject" ], "Resource": [ "arn:aws:s3:::example-bucket/*" ], "Effect": "Allow" }
2
VPC Flow Logs, Domain Name System (DNS) logs, AWS CloudTrail events
3
Create a new IAM role with the required permissions to access the resources in the production environment. The users can then assume this IAM role while accessing the resources from the production environment
4
Proxy methods PUT/POST/PATCH/OPTIONS/DELETE go directly to the origin, Dynamic content, as determined at request time (cache-behavior configured to forward all headers)
5
As the AWS KMS key was deleted a day ago, it must be in the 'pending deletion' status and hence you can just cancel the KMS key deletion and recover the key
6
Use server-side encryption with AWS Key Management Service keys (SSE-KMS) to encrypt the user data on Amazon S3
7
Use georestriction to prevent users in specific geographic locations from accessing content that you're distributing through a Amazon CloudFront web distribution, Use Amazon Route 53 based geolocation routing policy to restrict distribution of content to only the locations in which you have distribution rights
8
Configure AWS Web Application Firewall (AWS WAF) on the Application Load Balancer in a Amazon Virtual Private Cloud (Amazon VPC)
9
When you apply a retention period to an object version explicitly, you specify a Retain Until Date for the object version, Different versions of a single object can have different retention modes and periods
10
Use permissions boundary to control the maximum permissions employees can grant to the IAM principals
11
Use Amazon GuardDuty to monitor any malicious activity on data stored in Amazon S3. Use security assessments provided by Amazon Inspector to check for vulnerabilities on Amazon EC2 instances
12
Enable Multi Factor Authentication (MFA) for the AWS account root user account, Create a strong password for the AWS account root user
13
Enable AWS Multi-Factor Authentication (AWS MFA) for privileged users, Configure AWS CloudTrail to log all AWS Identity and Access Management (AWS IAM) actions
14
Use an Amazon Aurora Global Database for the games table and use Amazon Aurora for the users and games_played tables
15
Disable the service in the general settings
16
For security group B: Add an inbound rule that allows traffic only from security group A on port 1433, For security group A: Add an inbound rule that allows traffic from all sources on port 443. Add an outbound rule with the destination as security group B on port 1433
17
AWS Secrets Manager
18
For each developer, define an IAM permission boundary that will restrict the managed policies they can attach to themselves
19
AWS Transit Gateway
20
Server-side encryption with AWS Key Management Service (AWS KMS) keys (SSE-KMS) with automatic key rotation
21
Dedicated Instances
22
Attach the appropriate IAM role to the Amazon EC2 instance profile so that the instance can access Amazon S3 and Amazon DynamoDB
23
Use Amazon S3 Bucket Policies
24
Create a new Amazon S3 bucket in the us-east-1 region with replication enabled from this new bucket into another bucket in us-west-1 region. Enable SSE-KMS encryption on the new bucket in us-east-1 region by using an AWS KMS multi-region key. Copy the existing data from the current Amazon S3 bucket in us-east-1 region into this new Amazon S3 bucket in us-east-1 region
25
{ "Version":"2012-10-17", "Statement":[ { "Effect":"Allow", "Action":[ "s3:ListBucket" ], "Resource":"arn:aws:s3:::mybucket" }, { "Effect":"Allow", "Action":[ "s3:GetObject" ], "Resource":"arn:aws:s3:::mybucket/*" } ] }
26
Create an encrypted snapshot of the database, share the snapshot, and allow access to the AWS Key Management Service (AWS KMS) encryption key
27
Enable DNS hostnames and DNS resolution for private hosted zones
28
It allows running Amazon EC2 instances only in the eu-west-1 region, and the API call can be made from anywhere in the world
29
It allows starting an Amazon EC2 instance only when the IP where the call originates is within the 34.50.31.0/24 CIDR block
30
Build a shared services Amazon Virtual Private Cloud (Amazon VPC)
31
Set the DeleteOnTermination attribute to false
32
Take a snapshot of the database, copy it as an encrypted snapshot, and restore a database from the encrypted snapshot. Terminate the previous database
33
Users belonging to the IAM user group can terminate an Amazon EC2 instance in the us-west-1 region when the user's source IP is 10.200.200.200
34
Leverage AWS Config managed rule to check if any third-party SSL/TLS certificates imported into ACM are marked for expiration within 30 days. Configure the rule to trigger an Amazon SNS notification to the security team if any certificate expires within 30 days
35
By default, an Amazon S3 object is owned by the AWS account that uploaded it. So the Amazon S3 bucket owner will not implicitly have access to the objects written by the Amazon Redshift cluster
36
Use Amazon Cognito Authentication via Cognito User Pools for your Application Load Balancer
37
Create an IP match condition in the AWS WAF to block the malicious IP address
38
Create an IAM role for the AWS Lambda function that grants access to the Amazon S3 bucket. Set the IAM role as the AWS Lambda function's execution role. Make sure that the bucket policy also grants access to the AWS Lambda function's execution role
39
Security Groups are stateful, so allowing inbound traffic to the necessary ports enables the connection. Network access control list (network ACL) are stateless, so you must allow both inbound and outbound traffic
40
Use Amazon Cognito User Pools
41
Server-Side Encryption with Customer-Provided Keys (SSE-C)
42
The security group of the Amazon EC2 instances should have an inbound rule from the security group of the Application Load Balancer on port 80, The security group of Amazon RDS should have an inbound rule from the security group of the Amazon EC2 instances in the Auto Scaling group on port 5432, The security group of the Application Load Balancer should have an inbound rule from anywhere on port 443
43
Use a target tracking scaling policy based on a custom Amazon SQS queue metric
44
Security Groups are stateful, so allowing inbound traffic to the necessary ports enables the connection. Network ACLs are stateless, so you must allow both inbound and outbound traffic
45
Copying an Amazon Machine Image (AMI) backed by an encrypted snapshot cannot result in an unencrypted target snapshot, You can share an Amazon Machine Image (AMI) with another AWS account, You can copy an Amazon Machine Image (AMI) across AWS Regions
46
Create an inbound endpoint on Amazon Route 53 Resolver and then DNS resolvers on the on-premises network can forward DNS queries to Amazon Route 53 Resolver via this endpoint, Create an outbound endpoint on Amazon Route 53 Resolver and then Amazon Route 53 Resolver can conditionally forward queries to resolvers on the on-premises network via this endpoint
47
Configure an origin access identity (OAI) and associate it with the Amazon CloudFront distribution. Set up the permissions in the Amazon S3 bucket policy so that only the OAI can read the objects, Create an AWS WAF ACL and use an IP match condition to allow traffic only from those IPs that are allowed in the Amazon EC2 security group. Associate this new AWS WAF ACL with the Amazon CloudFront distribution
48
Service control policy (SCP) does not affect service-linked role, Service control policy (SCP) affects all users and roles in the member accounts, including root user of the member accounts, If a user or role has an IAM permission policy that grants access to an action that is either not allowed or explicitly denied by the applicable service control policy (SCP), the user or role can't perform that action
49
AWS VPN CloudHub
50
You can use an Internet Gateway ID as the custom source for the inbound rule
51
Connection Draining
52
Set up three NAT gateways, one in each public subnet in each AZ. Create a custom route table for each AZ that forwards non-local traffic to the NAT gateway in its AZ
53
Use VPC sharing to share one or more subnets with other AWS accounts belonging to the same parent organization from AWS Organizations
54
Use AWS Config to review resource configurations to meet compliance guidelines and maintain a history of resource configuration changes
55
Use VPC endpoint to access Amazon SQS
56
Create a virtual private gateway (VGW) on the AWS side of the VPN and a Customer Gateway on the on-premises side of the VPN
57
Use Amazon GuardDuty to monitor any malicious activity on data stored in Amazon S3. Use Amazon Macie to identify any sensitive data stored on Amazon S3
58
Configure a Network Address Translation gateway (NAT gateway) in the public subnet of the VPC
59
Use Amazon S3 Object Lock
60
It lets traffic flow from one IP on port 22, It allows any IP to pass through on the HTTP port, It configures a security group's inbound rules
61
It authorizes an entire Classless Inter-Domain Routing (CIDR) except one IP address to access the Amazon S3 bucket
62
Use a bucket policy to grant permission to users in its account as well as to users in another account
63
AWS Secrets Manager
64
Use Secure Sockets Layer certificate (SSL certificate) with SNI
65
Configure Amazon RDS to use SSL for data in transit
66
Check if the security groups allow ping from the source, Check if the route table is configured with internet gateway
67
Trust policy
68
Amazon DynamoDB, Amazon S3
69
Use IAM authentication from AWS Lambda to Amazon RDS PostgreSQL, Attach an AWS Identity and Access Management (IAM) role to AWS Lambda
70
The route for the health check is misconfigured, The security group of the Amazon EC2 instance does not allow for traffic from the security group of the Application Load Balancer
71
Use AWS Site-to-Site VPN as a backup connection, Use AWS Direct Connect connection as a primary connection
72
Add a rule to authorize the security group of the Application Load Balancer
73
Use AWS transit gateway to interconnect the VPCs
74
Data at rest inside the volume is encrypted, Data moving between the volume and the instance is encrypted, Any snapshot created from the volume is encrypted
75
Amazon ElastiCache for Redis/Memcached
76
Amazon API Gateway exposing AWS Lambda Functionality
77
Amazon S3 can encrypt object metadata by using Server-Side Encryption
78
The security group configuration for the database instance does not have the correct rules to allow inbound connections from the application servers
79
Use Amazon S3 Glacier vault to store the sensitive archived data and then use a vault lock policy to enforce compliance controls
80
Add a rule authorizing the Amazon EC2 security group
81
Use AWS WAF IP set statement that specifies the IP addresses that you want to allow through, Use AWS WAF geo match statement listing the countries that you want to block
82
Close the company's AWS account, Configure an Amazon S3 bucket to enable AWS Multi-Factor Authentication (AWS MFA) delete
83
Use AWS Web Application Firewall (AWS WAF) with Amazon CloudFront distribution
84
The route table in the instance’s subnet should have a route to an Internet Gateway, The network access control list (network ACL) associated with the subnet must have rules to allow inbound and outbound traffic
85
Create Amazon CloudFront distribution for the application on Amazon EC2 instances. Deploy AWS WAF on Amazon CloudFront to provide the necessary safety measures
86
Use AWS Site-to-Site VPN to establish encrypted network connectivity between the on-premises data center and AWS Cloud
87
By default, all Amazon DynamoDB tables are encrypted using AWS owned keys, which do not write to AWS CloudTrail logs
88
SSE-C
89
Set up an IAM service role with the appropriate permissions to allow access to the Amazon DynamoDB table. Configure an instance profile to assign this IAM role to the Amazon EC2 instance
90
Server-side encryption with Amazon S3 managed keys (SSE-S3)
91
Set up an AWS Site-to-Site VPN connection
92
Set up Amazon FSx for Windows File Server and move all the media files
93
Set up a Network Load Balancer in the public subnet. Create an Auto Scaling group in the private subnet and associate it with the Network Load Balancer
94
Use an AWS Web Application Firewall (AWS WAF) and setup a rate-based rule
95
Configure a single Amazon S3 bucket to hold all data. Use server-side encryption with Amazon S3 managed keys (SSE-S3) to encrypt the data
96
Create a separate gateway endpoint for Amazon S3 and Amazon DynamoDB each. Add two new target entries for these two gateway endpoints in the route table of the custom VPC
97
Set up an Amazon FSx for ONTAP instance. Configure an FSx for ONTAP file system on the root volume and migrate the data to the FSx for ONTAP volume
98
Set the DeleteOnTermination attribute to False using the command line
99
Create an origin access identity (OAI) and update the Amazon S3 Bucket Policy
100
Set up a service control policy (SCP) that prohibits changes to AWS CloudTrail, and attach it to the developer accounts
xj9 - 19628 - a
xj9 - 19628 - a
critical flaw · 98問 · 2年前xj9 - 19628 - a
xj9 - 19628 - a
98問 • 2年前xj9 - 19628 - b
xj9 - 19628 - b
critical flaw · 30問 · 2年前xj9 - 19628 - b
xj9 - 19628 - b
30問 • 2年前xj9 - 19628 - c
xj9 - 19628 - c
critical flaw · 99問 · 1年前xj9 - 19628 - c
xj9 - 19628 - c
99問 • 1年前xj9 - 19628 - d1
xj9 - 19628 - d1
critical flaw · 99問 · 1年前xj9 - 19628 - d1
xj9 - 19628 - d1
99問 • 1年前xj9 - 19628 - d2
xj9 - 19628 - d2
critical flaw · 98問 · 1年前xj9 - 19628 - d2
xj9 - 19628 - d2
98問 • 1年前1. Shattershot
1. Shattershot
critical flaw · 50問 · 1年前1. Shattershot
1. Shattershot
50問 • 1年前Conquest Book 1
Conquest Book 1
critical flaw · 100問 · 1年前Conquest Book 1
Conquest Book 1
100問 • 1年前k3ch - 2910116 - D1 - B
k3ch - 2910116 - D1 - B
critical flaw · 65問 · 1年前k3ch - 2910116 - D1 - B
k3ch - 2910116 - D1 - B
65問 • 1年前k3ch - 2910116 - D2 - A
k3ch - 2910116 - D2 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D2 - A
k3ch - 2910116 - D2 - A
100問 • 1年前k3ch - 2910116 - D2 - B
k3ch - 2910116 - D2 - B
critical flaw · 55問 · 1年前k3ch - 2910116 - D2 - B
k3ch - 2910116 - D2 - B
55問 • 1年前k3ch - 2910116 - D3 - A
k3ch - 2910116 - D3 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D3 - A
k3ch - 2910116 - D3 - A
100問 • 1年前k3ch - 2910116 - D3 - B
k3ch - 2910116 - D3 - B
critical flaw · 63問 · 1年前k3ch - 2910116 - D3 - B
k3ch - 2910116 - D3 - B
63問 • 1年前k3ch - 2910116 - D4 - A
k3ch - 2910116 - D4 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D4 - A
k3ch - 2910116 - D4 - A
100問 • 1年前1. X-Tinction Agenda
1. X-Tinction Agenda
critical flaw · 100問 · 1年前1. X-Tinction Agenda
1. X-Tinction Agenda
100問 • 1年前2. X-Tinction Agenda
2. X-Tinction Agenda
critical flaw · 100問 · 1年前2. X-Tinction Agenda
2. X-Tinction Agenda
100問 • 1年前3. X-Tinction Agenda
3. X-Tinction Agenda
critical flaw · 100問 · 1年前3. X-Tinction Agenda
3. X-Tinction Agenda
100問 • 1年前4. X-Tinction Agenda
4. X-Tinction Agenda
critical flaw · 90問 · 1年前4. X-Tinction Agenda
4. X-Tinction Agenda
90問 • 1年前Executioner's Song Book 1
Executioner's Song Book 1
critical flaw · 30問 · 1年前Executioner's Song Book 1
Executioner's Song Book 1
30問 • 1年前問題一覧
1
{ "Action": [ "s3:DeleteObject" ], "Resource": [ "arn:aws:s3:::example-bucket/*" ], "Effect": "Allow" }
2
VPC Flow Logs, Domain Name System (DNS) logs, AWS CloudTrail events
3
Create a new IAM role with the required permissions to access the resources in the production environment. The users can then assume this IAM role while accessing the resources from the production environment
4
Proxy methods PUT/POST/PATCH/OPTIONS/DELETE go directly to the origin, Dynamic content, as determined at request time (cache-behavior configured to forward all headers)
5
As the AWS KMS key was deleted a day ago, it must be in the 'pending deletion' status and hence you can just cancel the KMS key deletion and recover the key
6
Use server-side encryption with AWS Key Management Service keys (SSE-KMS) to encrypt the user data on Amazon S3
7
Use georestriction to prevent users in specific geographic locations from accessing content that you're distributing through a Amazon CloudFront web distribution, Use Amazon Route 53 based geolocation routing policy to restrict distribution of content to only the locations in which you have distribution rights
8
Configure AWS Web Application Firewall (AWS WAF) on the Application Load Balancer in a Amazon Virtual Private Cloud (Amazon VPC)
9
When you apply a retention period to an object version explicitly, you specify a Retain Until Date for the object version, Different versions of a single object can have different retention modes and periods
10
Use permissions boundary to control the maximum permissions employees can grant to the IAM principals
11
Use Amazon GuardDuty to monitor any malicious activity on data stored in Amazon S3. Use security assessments provided by Amazon Inspector to check for vulnerabilities on Amazon EC2 instances
12
Enable Multi Factor Authentication (MFA) for the AWS account root user account, Create a strong password for the AWS account root user
13
Enable AWS Multi-Factor Authentication (AWS MFA) for privileged users, Configure AWS CloudTrail to log all AWS Identity and Access Management (AWS IAM) actions
14
Use an Amazon Aurora Global Database for the games table and use Amazon Aurora for the users and games_played tables
15
Disable the service in the general settings
16
For security group B: Add an inbound rule that allows traffic only from security group A on port 1433, For security group A: Add an inbound rule that allows traffic from all sources on port 443. Add an outbound rule with the destination as security group B on port 1433
17
AWS Secrets Manager
18
For each developer, define an IAM permission boundary that will restrict the managed policies they can attach to themselves
19
AWS Transit Gateway
20
Server-side encryption with AWS Key Management Service (AWS KMS) keys (SSE-KMS) with automatic key rotation
21
Dedicated Instances
22
Attach the appropriate IAM role to the Amazon EC2 instance profile so that the instance can access Amazon S3 and Amazon DynamoDB
23
Use Amazon S3 Bucket Policies
24
Create a new Amazon S3 bucket in the us-east-1 region with replication enabled from this new bucket into another bucket in us-west-1 region. Enable SSE-KMS encryption on the new bucket in us-east-1 region by using an AWS KMS multi-region key. Copy the existing data from the current Amazon S3 bucket in us-east-1 region into this new Amazon S3 bucket in us-east-1 region
25
{ "Version":"2012-10-17", "Statement":[ { "Effect":"Allow", "Action":[ "s3:ListBucket" ], "Resource":"arn:aws:s3:::mybucket" }, { "Effect":"Allow", "Action":[ "s3:GetObject" ], "Resource":"arn:aws:s3:::mybucket/*" } ] }
26
Create an encrypted snapshot of the database, share the snapshot, and allow access to the AWS Key Management Service (AWS KMS) encryption key
27
Enable DNS hostnames and DNS resolution for private hosted zones
28
It allows running Amazon EC2 instances only in the eu-west-1 region, and the API call can be made from anywhere in the world
29
It allows starting an Amazon EC2 instance only when the IP where the call originates is within the 34.50.31.0/24 CIDR block
30
Build a shared services Amazon Virtual Private Cloud (Amazon VPC)
31
Set the DeleteOnTermination attribute to false
32
Take a snapshot of the database, copy it as an encrypted snapshot, and restore a database from the encrypted snapshot. Terminate the previous database
33
Users belonging to the IAM user group can terminate an Amazon EC2 instance in the us-west-1 region when the user's source IP is 10.200.200.200
34
Leverage AWS Config managed rule to check if any third-party SSL/TLS certificates imported into ACM are marked for expiration within 30 days. Configure the rule to trigger an Amazon SNS notification to the security team if any certificate expires within 30 days
35
By default, an Amazon S3 object is owned by the AWS account that uploaded it. So the Amazon S3 bucket owner will not implicitly have access to the objects written by the Amazon Redshift cluster
36
Use Amazon Cognito Authentication via Cognito User Pools for your Application Load Balancer
37
Create an IP match condition in the AWS WAF to block the malicious IP address
38
Create an IAM role for the AWS Lambda function that grants access to the Amazon S3 bucket. Set the IAM role as the AWS Lambda function's execution role. Make sure that the bucket policy also grants access to the AWS Lambda function's execution role
39
Security Groups are stateful, so allowing inbound traffic to the necessary ports enables the connection. Network access control list (network ACL) are stateless, so you must allow both inbound and outbound traffic
40
Use Amazon Cognito User Pools
41
Server-Side Encryption with Customer-Provided Keys (SSE-C)
42
The security group of the Amazon EC2 instances should have an inbound rule from the security group of the Application Load Balancer on port 80, The security group of Amazon RDS should have an inbound rule from the security group of the Amazon EC2 instances in the Auto Scaling group on port 5432, The security group of the Application Load Balancer should have an inbound rule from anywhere on port 443
43
Use a target tracking scaling policy based on a custom Amazon SQS queue metric
44
Security Groups are stateful, so allowing inbound traffic to the necessary ports enables the connection. Network ACLs are stateless, so you must allow both inbound and outbound traffic
45
Copying an Amazon Machine Image (AMI) backed by an encrypted snapshot cannot result in an unencrypted target snapshot, You can share an Amazon Machine Image (AMI) with another AWS account, You can copy an Amazon Machine Image (AMI) across AWS Regions
46
Create an inbound endpoint on Amazon Route 53 Resolver and then DNS resolvers on the on-premises network can forward DNS queries to Amazon Route 53 Resolver via this endpoint, Create an outbound endpoint on Amazon Route 53 Resolver and then Amazon Route 53 Resolver can conditionally forward queries to resolvers on the on-premises network via this endpoint
47
Configure an origin access identity (OAI) and associate it with the Amazon CloudFront distribution. Set up the permissions in the Amazon S3 bucket policy so that only the OAI can read the objects, Create an AWS WAF ACL and use an IP match condition to allow traffic only from those IPs that are allowed in the Amazon EC2 security group. Associate this new AWS WAF ACL with the Amazon CloudFront distribution
48
Service control policy (SCP) does not affect service-linked role, Service control policy (SCP) affects all users and roles in the member accounts, including root user of the member accounts, If a user or role has an IAM permission policy that grants access to an action that is either not allowed or explicitly denied by the applicable service control policy (SCP), the user or role can't perform that action
49
AWS VPN CloudHub
50
You can use an Internet Gateway ID as the custom source for the inbound rule
51
Connection Draining
52
Set up three NAT gateways, one in each public subnet in each AZ. Create a custom route table for each AZ that forwards non-local traffic to the NAT gateway in its AZ
53
Use VPC sharing to share one or more subnets with other AWS accounts belonging to the same parent organization from AWS Organizations
54
Use AWS Config to review resource configurations to meet compliance guidelines and maintain a history of resource configuration changes
55
Use VPC endpoint to access Amazon SQS
56
Create a virtual private gateway (VGW) on the AWS side of the VPN and a Customer Gateway on the on-premises side of the VPN
57
Use Amazon GuardDuty to monitor any malicious activity on data stored in Amazon S3. Use Amazon Macie to identify any sensitive data stored on Amazon S3
58
Configure a Network Address Translation gateway (NAT gateway) in the public subnet of the VPC
59
Use Amazon S3 Object Lock
60
It lets traffic flow from one IP on port 22, It allows any IP to pass through on the HTTP port, It configures a security group's inbound rules
61
It authorizes an entire Classless Inter-Domain Routing (CIDR) except one IP address to access the Amazon S3 bucket
62
Use a bucket policy to grant permission to users in its account as well as to users in another account
63
AWS Secrets Manager
64
Use Secure Sockets Layer certificate (SSL certificate) with SNI
65
Configure Amazon RDS to use SSL for data in transit
66
Check if the security groups allow ping from the source, Check if the route table is configured with internet gateway
67
Trust policy
68
Amazon DynamoDB, Amazon S3
69
Use IAM authentication from AWS Lambda to Amazon RDS PostgreSQL, Attach an AWS Identity and Access Management (IAM) role to AWS Lambda
70
The route for the health check is misconfigured, The security group of the Amazon EC2 instance does not allow for traffic from the security group of the Application Load Balancer
71
Use AWS Site-to-Site VPN as a backup connection, Use AWS Direct Connect connection as a primary connection
72
Add a rule to authorize the security group of the Application Load Balancer
73
Use AWS transit gateway to interconnect the VPCs
74
Data at rest inside the volume is encrypted, Data moving between the volume and the instance is encrypted, Any snapshot created from the volume is encrypted
75
Amazon ElastiCache for Redis/Memcached
76
Amazon API Gateway exposing AWS Lambda Functionality
77
Amazon S3 can encrypt object metadata by using Server-Side Encryption
78
The security group configuration for the database instance does not have the correct rules to allow inbound connections from the application servers
79
Use Amazon S3 Glacier vault to store the sensitive archived data and then use a vault lock policy to enforce compliance controls
80
Add a rule authorizing the Amazon EC2 security group
81
Use AWS WAF IP set statement that specifies the IP addresses that you want to allow through, Use AWS WAF geo match statement listing the countries that you want to block
82
Close the company's AWS account, Configure an Amazon S3 bucket to enable AWS Multi-Factor Authentication (AWS MFA) delete
83
Use AWS Web Application Firewall (AWS WAF) with Amazon CloudFront distribution
84
The route table in the instance’s subnet should have a route to an Internet Gateway, The network access control list (network ACL) associated with the subnet must have rules to allow inbound and outbound traffic
85
Create Amazon CloudFront distribution for the application on Amazon EC2 instances. Deploy AWS WAF on Amazon CloudFront to provide the necessary safety measures
86
Use AWS Site-to-Site VPN to establish encrypted network connectivity between the on-premises data center and AWS Cloud
87
By default, all Amazon DynamoDB tables are encrypted using AWS owned keys, which do not write to AWS CloudTrail logs
88
SSE-C
89
Set up an IAM service role with the appropriate permissions to allow access to the Amazon DynamoDB table. Configure an instance profile to assign this IAM role to the Amazon EC2 instance
90
Server-side encryption with Amazon S3 managed keys (SSE-S3)
91
Set up an AWS Site-to-Site VPN connection
92
Set up Amazon FSx for Windows File Server and move all the media files
93
Set up a Network Load Balancer in the public subnet. Create an Auto Scaling group in the private subnet and associate it with the Network Load Balancer
94
Use an AWS Web Application Firewall (AWS WAF) and setup a rate-based rule
95
Configure a single Amazon S3 bucket to hold all data. Use server-side encryption with Amazon S3 managed keys (SSE-S3) to encrypt the data
96
Create a separate gateway endpoint for Amazon S3 and Amazon DynamoDB each. Add two new target entries for these two gateway endpoints in the route table of the custom VPC
97
Set up an Amazon FSx for ONTAP instance. Configure an FSx for ONTAP file system on the root volume and migrate the data to the FSx for ONTAP volume
98
Set the DeleteOnTermination attribute to False using the command line
99
Create an origin access identity (OAI) and update the Amazon S3 Bucket Policy
100
Set up a service control policy (SCP) that prohibits changes to AWS CloudTrail, and attach it to the developer accounts