CLF-C01 Exam QuestionsBrowse all questions from this exam

CLF-C01 Exam - Question 99


Using AWS Config to record, audit, and evaluate changes to AWS resources to enable traceability is an example of which AWS Well-Architected Framework pillar?

Show Answer
Correct Answer: A

Using AWS Config to record, audit, and evaluate changes to AWS resources to enable traceability aligns with the Security pillar of the AWS Well-Architected Framework. The Security pillar focuses on protecting information, systems, and assets while maintaining data confidentiality, integrity, and availability. Maintaining traceability is a key security best practice, as it involves monitoring, alerting, and auditing actions and changes in real-time to ensure compliance and detect potential security issues.

Discussion

32 comments
Sign in to comment
JohnO1971
Sep 30, 2021

From the Security section of https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf " • Enable traceability: Monitor, alert, and audit actions and changes to your environment in real time. Integrate log and metric collection with systems to automatically investigate and take action."

PSL95
Sep 20, 2021

A is correct.

bipuljaishwal
Oct 22, 2021

A is correct. See https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/wellarchitected-security-pillar.pdf

Joggy12
Oct 28, 2021

A: to enable traceability, "here are seven design principles for security in the cloud: Implement a strong identity foundation Enable traceability Apply security at all layers Automate security best practices Protect data in transit and at rest Keep people away from data Prepare for security events"

Vita_Rasta84444
Sep 25, 2021

I think it is Operational Excellence, B. Anticipate failures and trace it, using AWS Config.

aboeyunus
Oct 21, 2021

In the Well Architected Framework Security: ------> Enable traceability - Integrate logs and metrics with systems to automatically respond and take action So A is correct!

rachmatthidayatOption: B
May 26, 2023

It's B. Operational Excellence . If you refer to the AWS_Well_Architected_Framework.pdf its under Security section, when take a closer look and you will find its talking about one of the seven design principles for security in the cloud, not specifically in the context of the questions. The question is specifically mentioning "AWS Config" at the first sentence, take a walk to the AWS Config main page and you will find some of the related use cases is related with the Operations activities: like continually assess, monitor, and record resource configuration changes to simplify change management and to simplify operational troubleshooting by correlating configuration changes to particular events in your account. Reference: https://aws.amazon.com/config/

Mable777Option: A
Sep 7, 2023

Both the Security and Operational Excellence pillars of the AWS Well-Architected Framework can have relevance to the use of AWS Config, depending on the specific context. Security Pillar: AWS Config is valuable for ensuring resources are compliant with security best practices and policies. It assists in detecting drifts from the baseline and can help spot potential security vulnerabilities. From the perspective of maintaining a security posture and ensuring compliance, AWS Config aligns with the Security pillar. Operational Excellence Pillar: AWS Config also plays a role in the continuous monitoring and refinement of operations. Knowing the state of resources, understanding changes, and being able to trace these changes over time can support operational best practices. If the primary goal is to provide traceability, monitor changes, and ensure that the operations are running according to defined standards, then AWS Config can indeed be associated with the Operational Excellence pillar.

ThePunisher77
Oct 9, 2021

A is correct. Keyword is traceability.

BillyC
Nov 9, 2021

A is correct

Saif93Option: A
Jan 19, 2023

A is the answer. https://aws.amazon.com/blogs/apn/the-6-pillars-of-the-aws-well-architected-framework/

Warsame21Option: B
Jun 15, 2023

B. Operational excellence

khandaOption: B
Jul 12, 2023

Read through https://aws.amazon.com/config/

tushmishOption: B
Sep 3, 2023

search for AWS Config to find out its usage. https://docs.aws.amazon.com/pdfs/wellarchitected/latest/operational-excellence-pillar/wellarchitected-operational-excellence-pillar.pdf

tushmish
Sep 17, 2023

Its A, Changed mind https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/security.html Maintain traceability: Monitor, alert, and audit actions and changes to your environment in real time. Integrate log and metric collection with systems to automatically investigate and take action.

ManikRoyOption: A
Jan 22, 2024

Maintaining Traceability is one of the security best practices.

bilel500Option: A
Sep 7, 2022

Answer is A.

sumanshu
Sep 16, 2022

Vote for A

Istiaque
Sep 28, 2022

Answer is A

BloodyMery
Dec 21, 2022

it should be B cause it is not talking about finding security holes. AWS Config is here doing as a monitoring/change traceability tool, so it fits better in Operational Excellence pillar. https://docs.aws.amazon.com/pdfs/wellarchitected/latest/operational-excellence-pillar/wellarchitected-operational-excellence-pillar.pdf

bugalterOption: A
Feb 16, 2023

A. Security

wuuuu
Feb 20, 2023

In chatgpt, the answer is B. Which is the correct answer, A or B?

Warsame21Option: A
Jun 15, 2023

B. Network ACL

Ron_Mistah
Aug 13, 2023

maybe pasted incorrectly, this is the answer for question #100 :)

ESAJRROption: A
Jun 29, 2023

A. Security

man5484Option: A
Jul 13, 2023

Using AWS Config to record, audit, and evaluate changes to AWS resources aligns with the Security pillar of the AWS Well-Architected Framework. The Security pillar focuses on protecting information, systems, and assets while maintaining data confidentiality, integrity, and availability. AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources over time. It records changes to resource configurations and provides a detailed view of how the configurations are aligned with best practices and desired configurations. By using AWS Config, you can track and maintain traceability of changes to your resources, helping to enforce security controls, detect unauthorized changes, and ensure compliance with security requirements.

GulsahOption: A
Jul 16, 2023

I think the key word is `traceability`, therefore the answer must be A.Security.

jekumOption: A
Aug 15, 2023

A is correct.

OripresaOption: A
Sep 21, 2023

son sistemas deseguridad no de excelencia operativa

HOYIITPUCOOption: A
Oct 10, 2023

This paper has been archived. The latest version is available at: https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html

sukjubaeOption: A
Jan 17, 2024

A is correct

AKSH_SURANIOption: B
Mar 23, 2024

Using AWS Config to record, audit, and evaluate changes to AWS resources to enable traceability aligns with the "Operational Excellence" pillar of the AWS Well-Architected Framework. The Operational Excellence pillar focuses on the ability to run and monitor systems to deliver business value, and continually improve processes and procedures. AWS Config helps in achieving this by providing a detailed record of configuration changes to AWS resources, enabling auditability, compliance, and governance. It allows organizations to maintain a complete inventory of their AWS resources and track changes over time, facilitating operational excellence through enhanced visibility and control.

sonaljainOption: A
Dec 28, 2024

Security

HebaXXOption: A
Mar 25, 2025

Performance Efficiency vs. Security: While Performance Efficiency focuses on optimizing cloud resources for performance, Security involves safeguarding data, systems, and applications by continuously monitoring and auditing for vulnerabilities, misconfigurations, and other risks. AWS Config and Its Relationship with Security: AWS Config helps you record and track the configuration of AWS resources, and it also evaluates changes to ensure compliance with security and operational best practices. The primary goal is to audit changes to resources, ensuring that your environment remains secure and compliant with established policies.