Search⌘ K
AI Features

Secure Architecture IV

Explore methods to secure AWS environments by implementing continuous monitoring of API activities, controlling access to source code with role-based permissions, and ensuring secure user authentication with encrypted data transmission. This lesson helps you understand how to detect unauthorized access, maintain compliance, and protect sensitive information in cloud architectures.

We'll cover the following...

Question 34

A financial services firm is in the process of increasing the security provided to an AWS environment. They call for constant supervision of all API operations timely notification of instances of unauthorized attempts to access the APIs, and a frequent check of the APIs’ security parameters against standard guidelines.

As a solutions architect, suggest a solution that ensures continuous monitoring of API activities, alerts on unauthorized access attempts, and regular security assessments against best practices.

A. Use AWS CloudTrail to track all API activities, Amazon GuardDuty for intelligent security detection, and AWS Security Hub for always-on compliance checks and ensuring that security standards are being followed.

B. Use AWS Config to ...