SCS-C02 Exam QuestionsBrowse all questions from this exam

SCS-C02 Exam - Question 8


A company has deployed Amazon GuardDuty and now wants to implement automation for potential threats. The company has decided to start with RDP brute force attacks that come from Amazon EC2 instances in the company's AWS environment. A security engineer needs to implement a solution that blocks the detected communication from a suspicious instance until investigation and potential remediation can occur.

Which solution will meet these requirements?

Show Answer
Correct Answer: D

To meet the requirements of blocking detected communication from a suspicious instance until investigation and potential remediation can occur, the best approach is to replace the security group of the suspicious instance with one that does not allow any connections. By doing so, it effectively isolates the instance without affecting other parts of the network. This method leverages AWS Security Hub to ingest GuardDuty findings and an AWS Lambda function to make the necessary security group changes, ensuring a swift and automated response to the detected threat.

Discussion

17 comments
Sign in to comment
Daniel76Option: C
Nov 13, 2023

Let Guardduty detections be sent to Security Hub as findings is a simple and elegant way. https://docs.aws.amazon.com/guardduty/latest/ug/securityhub-integration.html Use eventbridge to respond by invoke Lambda. Amazon Kinesis data stream not needed. https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cloudwatch-events.html Suggest to only block specific port 389 against thse suspicious EC2 instance instead of isolate it in a security group, to minimize the impact while it has not been verified as a confirmed attack.

RaphaelloOption: C
Dec 14, 2023

C SecurityGroup is a simpler way of isolating a suspicious instance, unlike Network Firewall that is a paid service. EventBridge is needed to relay events to Kinesis Data Stream. At that point, what is the need to Kinesis Data Stream? Lambda function could be invoked directly from EventBridge. For that, I'd go with C.

3633f8fOption: D
Dec 15, 2023

To isolate there is nothing more powerful that an ACL at subnet level, which immediately denies traffic in any direction. Wishing to automate, there is no choice to use ACL, as you do not know the exact IP of the source is attacking, thus, you do apply security group restiction. The need of Kinesys Data Streams is to process real-time events while happening. A firewall you do not usually automate at his has complex features needs to be set via IaC or console.

3633f8f
Dec 17, 2023

Correcting as RDP handles directly in layer 3. C

brpjp
Dec 31, 2023

Answer B correct. Requested first scenario of RDP brute force attack. Neither NACL, Network Firewall, and Security Group support to block, only WAF help to block traffic based on pattern.

cumzle_com
Jun 16, 2024

WAf only for http traffic :)

AameeOption: C
Nov 29, 2023

Would go with C since it has asked specifically for automating the security findings... and that's where Security Hub comes into play with EventBridge combination..

WeepingMaplte
Dec 13, 2023

AWS Network Firewall is a better option unless the question wants the most cost-effective method. https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-group-stateful-creating.html#:~:text=Stateful%20actions.-,To%20define%20IP%20sets%20and%20ports%20as%20variables%20that%20you%20can,variables%20and%20values%20for%20IP%20set%20variables%20and%20Port%20variables.,-To%20add%20one

Raphaello
Dec 13, 2023

C SecurityGroup is a simpler way of isolating a suspicious instance, unlike Network Firewall that is a paid service. EventBridge is needed to relay events to Kinesis Data Stream. At that point, what is the need to Kinesis Data Stream? Lambda function could be invoked directly from EventBridge. For that, I'd go with C.

3633f8fOption: C
Dec 17, 2023

C is the answer

brpjp
Dec 31, 2023

When GuardDuty is there, do not understand what is requirement to integrate Security Hub.

brpjp
Jan 1, 2024

Hello, correct my understanding agree with answer C.

happy34
Jan 8, 2024

D is the answer. we need identify the best method - tech and cost. implied. WAF is layer 7 prevention . FW is layer 3 - 7. WEB ACL can prevent layer 7. RDP is mostly Layer 7. password guessing etc https://repost.aws/knowledge-center/waf-prevent-brute-force-attacks

shuaaaa
May 4, 2024

RDP is L3 (IP) + L4 (Port 3389). it is NOT L7.

mynickcOption: C
Jan 27, 2024

Here is some basics: WAF protects the port 443 / 80. RDP is different port and nothing to do with Layer 7 nor WAF

awssecuritynewbieOption: C
Jan 27, 2024

I would go with C, as option D will block any connection to the Ec2 machine, which is not what you want, and security groups are easier and at the endpoint level.

RaphaelloOption: C
Feb 9, 2024

1. No point to use Kinesis Data Stream/analytics/Apache flink to stream and process event. 2. Neither WAF nor NACL is an effective solution to the mentioned case 3. GuardDuty findings can be sent directly to Amazon EventBridge to trigger action, but deploying SecurityHub is not entirely wrong. 4. AWS Network Firewall is better suited to block suspicious instances. Option C is the correct answer.

cumzle_comOption: D
Jun 16, 2024

While Option C is technically feasible and provides robust network-level protection using AWS Network Firewall, it is more complex and might be an overkill for the specific task of quickly isolating individual EC2 instances. Option D offers a more direct and simpler approach by replacing the security group of the suspicious instance, which is generally easier to manage and quicker to implement in the context of isolating instances based on GuardDuty findings. Therefore, while Option C can meet the requirements, Option D is more appropriate and efficient for the specific task of blocking communication from suspicious instances quickly and effectively.

DLG_85
Jun 28, 2024

Option B. We have to consider that Security team has to be noticed. There is nothing about that on the other answers.

Almo89Option: C
Jul 2, 2024

No A: Kenesis is for a stream of data. Guardduty will report (raise alarm) but no need of apache flink Not B: WAF is for a web application (80, 443), the attack will be initiated from a EC2 (internal company machine) it doesn't specify the target location local or extern, but it will be RDP Not D- SG will not block outbound traffic (stateful). SG will not be enough, the ec2 initiates the attack C is the simplest and more correct as FW will block any traffic from/to ec2