Your organization has hundreds of developers using AWS accounts.
Based on the organization policy, when a developer joins the company, a new AWS account is created for that user and added to the AWS Organisation for development and testing purposes.
Click on the arrows to vote for the correct answer
A. B. C. D. E.Correct Answers: A, B, C, and E.
Option A is CORRECT because the SCP or Service Control Policies can be used to allow/deny different AWS services depending on the requirement.
Option B is CORRECT because the CloudWatch Events can be tracked based on CloudTrail API calls.
This can be the starting point for collecting the information from the user accounts.
For example, some CloudWatch Events can be triggered for an EC2 instance has been launched.
However, this alone will not work, and some form of analysis will require to run on these events.
Option C is CORRECT because the CloudTrail logs can be aggregated to the central S3 bucket and analyzed there.
Option D is INCORRECT because this will not be an effective and scalable solution.
There will be thousands of events, and it may not make any sense to process each of them for malicious activities.
Option E is CORRECT because Users and roles must still be granted permissions with appropriate IAM permission policies.
A user without any IAM permission policies has no access at all, even if the applicable SCPs allow all services and all actions.
The organization has a policy to create a new AWS account for each developer that joins the company, and these accounts are added to the AWS Organization for development and testing purposes. To ensure security and compliance, the following measures can be taken:
A. Implement Service Control Policies (SCPs) to whitelist or blacklist different AWS services depending on the user role. SCPs are used to set boundaries for what actions users can take in an AWS account. By creating SCPs that restrict certain services and actions based on the user role, the organization can ensure that users are only allowed to use the services that are necessary for their job functions.
B. Use CloudWatch Events to track the user activities. CloudWatch Events can be used to monitor user activities, including API calls, console sign-in events, and more. By setting up event rules, the organization can be notified when specific events occur, such as failed login attempts or changes to security group rules.
C. Enable CloudTrail in the user accounts to track and log user activities, and redirect the logs to the organization-wide S3 bucket for processing. CloudTrail provides a record of API calls and other activities that occur within an AWS account. By enabling CloudTrail in the user accounts, the organization can track and log user activities and redirect the logs to a central S3 bucket for processing and analysis.
D. Run AWS Lambda on individual user accounts to check for malicious activities. AWS Lambda can be used to run custom code in response to specific events, such as API calls or changes to AWS resources. By running Lambda functions in individual user accounts, the organization can detect and respond to malicious activities in real-time.
E. Assign IAM policies to only allow certain activities. IAM policies can be used to grant permissions to specific AWS resources and actions. By assigning IAM policies that only allow users to perform necessary activities, the organization can restrict access to sensitive resources and prevent users from performing unauthorized actions.
Overall, by implementing these measures, the organization can ensure that its AWS accounts are secure and compliant with industry standards and regulations.