Search⌘ K
AI Features

Security II

Explore key security concepts for AWS developers working with serverless applications. Understand how to securely grant Lambda function permissions, implement effective S3 encryption, isolate application environments, and monitor API activity. This lesson prepares you to apply best practices and secure AWS resources efficiently.

Question 27

A developer is building a serverless web application in which AWS Lambda functions need to securely access data from an Amazon S3 bucket. Which is the most secure and recommended approach for the Lambda function to obtain the necessary permissions without hardcoding credentials?

A. Assign an IAM role with appropriate S3 permissions to the Lambda function.

B. Create an IAM user with S3 access permissions and hardcode its credentials in the Lambda function code.

C. Store AWS access and secret keys directly within the Lambda function’s environment variables.

D. Generate temporary credentials using AWS Security Token Service (STS) on a local machine and then upload them to the Lambda function.

Question 28

A company stores highly sensitive financial reports in an Amazon S3 bucket. The company’s compliance regulations mandate that all data at ...