An organization stores sensitive customer in S3 buckets protected by bucket policies. Recently, there have been reports that unauthorized entities within the company have been trying to access the data on those S3 buckets. The Chief Information Security Officer (CISO) would like to know which buckets are being targeted and determine who is responsible for trying to access that information. Which steps should a SysOps Administrator take to meet the CISO's requirement? (Choose two.)
A) Enable Amazon S3 Analytics on all affected S3 buckets to obtain a report of which buckets are being accessed without authorization.
B) Enable Amazon S3 Server Access Logging on all affected S3 buckets and have the logs stored in a bucket dedicated for logs.
C) Use Amazon Athena to query S3 Analytics report for HTTP 403 errors, and determine the IAM user or role making the requests.
D) Use Amazon Athena to query the S3 Server Access Logs for HTTP 403 errors, and determine the IAM user or role making the requests.
E) Use Amazon Athena to query the S3 Server Access Logs for HTTP 503 errors, and determine the IAM user or role making the requests.
Correct Answer:
Verified
Q669: A SysOps Administrator is managing an AWS
Q670: A SysOps Administrator must secure AWS CloudTrail
Q671: A SysOps Administrator noticed that the cache
Q672: A company has created an online retail
Q673: An application running on Amazon EC2 instances
Q675: A SysOps Administrator is deploying a legacy
Q676: A company's Information Security team has requested
Q677: A company uses AWS CloudFormation to deploy
Q678: An Amazon S3 bucket in a SysOps
Q679: A company runs a web application that
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents