A company is using AWS to run a long-running analysis process on data that is stored in Amazon S3 buckets.
The process runs on a fleet of Amazon EC2 instances in an Auto Scaling group. The EC2 instances are
deployed in a private subnet that does not have internet access.
The EC2 instances access Amazon S3 through an S3 gateway endpoint that has the default access policy.
Each EC2 instance uses an instance profile role that allows s3:GetObject and s3:PutObject only for required
S3 buckets.
The company learns that one or more EC2 instances are compromised and are exfiltrating data to an S3
bucket that isoutside the company’s AWS Organization. The processing job must continue to function.
Which solution will meet these requirements?
A company has several Amazon S3 buckets that do not enforce encryption in transit. A security engineer must
implement a solution that enforces encryption in transit for all the company's existing and future S3 buckets.
Which solution will meet these requirements?
A company hosts its public website on Amazon EC2 instances behind an Application Load Balancer (ALB).
The website is experiencing a global DDoS attack by a specific IoT device brand that has a unique user agent.
A security engineer is creating an AWS WAF web ACL and will associate the web ACL with the ALB. The
security engineer must implement a rule statement as part of the web ACL to block the requests. The rule
statement must mitigate the current attack and future attacks from these IoT devices without blocking requests
from customers.
Which rule statement will meet these requirements?
A company's web application is hosted on Amazon EC2 instances running behind an Application Load
Balancer (ALB) in an Auto Scaling group. An AWS WAF web ACL is associated with the ALB. AWS
CloudTrail is enabled and stores logs in Amazon S3 and Amazon CloudWatch Logs. The operations team has observed some EC2 instances reboot at random. After rebooting, all access logs on
the instances have been deleted. During an investigation, the operations team found that each reboot happened
just after a PHP error occurred on the new-user-creation.php file. The operations team needs to view log
information to determine if the company is being attacked.
Which set of actions will identify the suspect attacker's IP address for future occurrences?