AWS Certified Developer Associate DVA-C02 Practice Question
An organization's development team is preparing to roll out a serverless application that utilizes multiple cloud resources, including object storage, a NoSQL database, and serverless compute functions. The application must be able to read and write data to specific storage buckets and database tables. To comply with best security practices, how should you provision access for this application?
Construct a custom security profile for the application, restricting permissions exclusively to the operations required on designated storage buckets and database tables.
Generate an access key and secret key combination for the application, granting full management capabilities for all services to avoid potential disruptions.
Deactivate explicit permission policies and deploy network-based controls to govern access to the necessary service resources.
Employ the root user's credentials for the application to ensure uninterrupted service access without having to manage multiple permission sets.
Based on the principle of least privilege, the correct approach is to create a custom security profile (also known as an IAM role when implemented in AWS) for the application with the minimal set of permissions needed, which are those that allow reading from and writing to the specified storage buckets and database tables only. Granting full management capabilities across all services, as well as using the root user's credentials, would violate this principle by providing unnecessarily broad permissions and introduce significant security risks. Relying solely on network-based access controls is also incorrect as these are different types of security measures that do not manage the permissions for accessing cloud resources the way IAM roles or policies do.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of least privilege?
Open an interactive chat with Bash
What are IAM roles in AWS?
Open an interactive chat with Bash
Why should you avoid using root user credentials in AWS?
Open an interactive chat with Bash
AWS Certified Developer Associate DVA-C02
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access