Security and Compliance

Implement and manage security policies, data protection, and compliance requirements (~16% of exam).

Covers implementing and managing IAM policies including policy types (identity-based, resource-based, SCPs), IAM roles, instance profiles, cross-account access, and AWS Organizations. Also covers implementing data protection including encryption at rest (KMS, EBS encryption, S3 encryption), encryption in transit (TLS/SSL, ACM certificates), AWS Secrets Manager, and Systems Manager Parameter Store. Covers compliance and auditing using AWS Config rules, AWS CloudTrail, Amazon Inspector, AWS Security Hub, Amazon GuardDuty, and AWS Trusted Advisor security checks. Also includes security groups, NACLs, and VPC security best practices.
5 minutes 5 Questions

Security and Compliance in AWS is a fundamental domain for the SysOps Administrator certification, focusing on protecting AWS resources and meeting regulatory requirements. AWS operates on a Shared Responsibility Model where AWS manages security OF the cloud (physical infrastructure, hardware, netw…

Concepts covered: Resource-based policies, IAM policy evaluation logic, AWS managed keys, EBS encryption, S3 encryption options, IAM permission boundaries, Config conformance packs, Encryption at rest, AWS IAM policies, Identity-based policies, IAM roles and instance profiles, Cross-account access, AWS Organizations, Service control policies (SCPs), IAM Access Analyzer, Security groups, Network ACLs, VPC security best practices, AWS KMS key management, KMS key policies, Customer managed keys, RDS encryption, Encryption in transit, AWS Certificate Manager, TLS/SSL certificates, AWS Secrets Manager, Secrets rotation, AWS CloudTrail for auditing, CloudTrail log analysis, AWS Config compliance, Amazon Inspector, AWS Security Hub, Amazon GuardDuty, AWS Trusted Advisor security, Amazon Macie, AWS Artifact, Shared responsibility model

Test mode:
SOA-C02 - Security and Compliance Example Questions

Test your knowledge of Security and Compliance

Question 1

A media streaming company hosts video transcoding servers in a private subnet (10.0.70.0/24) that must download source files from an S3 bucket via a Gateway VPC endpoint. The subnet uses a custom Network ACL with the following configuration: Inbound Rule 100: ALLOW TCP 443 from 10.0.0.0/16; Outbound Rule 100: ALLOW TCP 443 to 0.0.0.0/0; Rule *: DENY ALL (default). Security groups permit all HTTPS traffic. Route tables correctly direct S3-prefixed traffic to the Gateway endpoint. Transcoding jobs fail when attempting to download files from S3, with connection timeout errors in the application logs. VPC Flow Logs show outbound packets reaching S3 successfully, but response packets are rejected at the subnet boundary. The S3 service responds using source ports that vary based on the AWS region's S3 infrastructure. What Network ACL modification will restore S3 connectivity through the Gateway endpoint?

Question 2

A SysOps Administrator at a logistics company is setting up Amazon CloudWatch Logs encryption for the first time. The team wants to encrypt log groups containing shipment tracking data but has limited budget and prefers minimal configuration overhead. When the Administrator navigates to the CloudWatch Logs console to enable encryption on a log group, they notice an option to use an AWS managed key. A team member asks whether they can use the AWS managed key (aws/logs) to encrypt CloudWatch Logs and what prerequisites exist for this approach. What should the Administrator explain about using AWS managed keys with CloudWatch Logs?

Question 3

A software development company runs a CI/CD pipeline in AWS. Build agents in subnet 10.0.80.0/24 pull source code from a Git server in subnet 10.0.90.0/24 over TCP port 22 (SSH). The build agents initiate connections using ephemeral source ports 49152-65535. Both subnets have custom Network ACLs. The build agent subnet's NACL has: Inbound Rule 100: ALLOW TCP 22 from 10.0.90.0/24; Outbound Rule 100: ALLOW TCP 22 to 10.0.90.0/24. The Git server subnet's NACL has: Inbound Rule 100: ALLOW TCP 22 from 10.0.80.0/24; Outbound Rule 100: ALLOW TCP 22 to 10.0.80.0/24. Security groups on both tiers permit SSH traffic bidirectionally. Build jobs fail with 'Connection timed out' errors when attempting to clone repositories. Network packet captures show that SSH connection requests from build agents reach the Git server, and the server generates response packets from source port 22 to the agents' ephemeral destination ports. These response packets successfully leave the Git server subnet but are dropped when entering the build agent subnet. What is preventing the SSH responses from reaching the build agents?

More Security and Compliance questions
1764 questions (total)