Exam SCS-C02 All QuestionsBrowse all questions from this exam
Question 159

A development team is creating an open source toolset to manage a company's software as a service (SaaS) application. The company stores the code in a public repository so that anyone can view and download the toolset's code.

The company discovers that the code contains an IAM access key and secret key that provide access to internal resources in the company’s AWS environment

A security engineer must implement a solution to identify whether unauthorized usage of the exposed credentials has occurred. The solution also must prevent any additional usage of the exposed credentials.

Which combination of steps will meet these requirements? (Choose two.)

    Correct Answer: A, B

    To meet the requirements of identifying unauthorized usage of the exposed credentials and preventing further usage, use AWS Identity and Access Management (IAM) Access Analyzer to determine which resources the exposed credentials accessed and who used them, thereby identifying any unauthorized activity. Additionally, deactivate the exposed IAM access key from the user's IAM account to immediately stop any further use of the compromised credentials.

Discussion
f3f9bfeOptions: AB

Security Engineer must identified whether unauthorized usage of the exposed credential has occurred and prevent any additional usage of the exposed credential. The Answers are A and B

sema2232

B, E correct

danish1234

A and E

zek

A, B look Ok to me

7c84836

why A over E?

aescudero51Options: AB

My answer is A & B A. Use AWS Identity and Access Management Access Analyzer to determine which resources the exposed credentials accessed and who used them. This will help identify if any unauthorized activity occurred while the credentials were exposed. B. Deactivate the exposed IAM access key from the user's IAM account. This will immediately prevent any further use of the compromised credentials.