AWS Certified SysOps Administrator - Associate Exam: Security Rules for Accessing EC2 Instance

Modify Security Rules for Accessing EC2 Instance | AWS Certified SysOps Administrator - Associate Exam

Question

You are the Systems Administrator for a company.

They have set up an EC2 Instance in a VPC (CIDR 10.0.0.0/16) hosting a Web-based application.

You need to modify the security rules so that users from around the world can access the application.

Also, you need to be able to SSH into the instance from your workstation with an IP of 20.90.6.7

Which of the following Security rules would you put in place? Choose 2 answers from the options given below.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

Correct Answers: B and D.

Such as example is also mentioned in the AWS Documentation.

Since users from all over the world need access to the web application, you need to ensure that the source IP range needs to be 0.0.0.0/0 and not 10.0.0.0/16.

And if you want to SSH into the instance from an IP, it needs to be 20.90.6.7/32 and not the internet.

For more information on using Network Security, please refer to the below URL-

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html
Inbound rules

Protocol type Port number Source IP

TcP 22 (SSH) 203.0.113.1/32
TcP 80(HTTP) —_0.0.0.0/0
IcMP All 0.0.0.0/0

Outbound rules
Protocol type Port number Destination IP
All All 0.0.0.0/0

To modify the security rules so that users from around the world can access the application, an inbound security rule needs to be added to allow incoming traffic on port 80 from any source IP address. This can be accomplished by adding an inbound security rule with port 80 and source IP 0.0.0.0/0. Option B is correct: Add an Inbound Security Rule of port(80) and Source IP as 0.0.0.0/0.

To allow SSH access from the specified IP address, an inbound security rule needs to be added to allow incoming traffic on port 22 from the specified IP address. This can be accomplished by adding an inbound security rule with port 22 and source IP 20.90.6.7/32. Option D is correct: Add an Inbound Security Rule of port(22) and Source IP as 20.90.6.7/32.

Options A and C are not correct. Option A allows incoming traffic on port 80 only from within the VPC, which would not allow users from around the world to access the application. Option C allows SSH access from any source IP address, which would be a security risk.