mediummultiple choiceObjective-mapped

In an AWS Organizations environment, developers create IAM roles using an automation tool. The security team wants to guarantee that even if a developer attaches an overly permissive inline policy, the role cannot exceed a fixed set of allowed actions. The team already uses permission boundaries on each role. The tool’s role-creation API call succeeds, but one developer’s new role can still delete production S3 buckets. What is the most likely reason, and what should be corrected?

Question 1mediummultiple choice
Full question →

In an AWS Organizations environment, developers create IAM roles using an automation tool. The security team wants to guarantee that even if a developer attaches an overly permissive inline policy, the role cannot exceed a fixed set of allowed actions. The team already uses permission boundaries on each role. The tool’s role-creation API call succeeds, but one developer’s new role can still delete production S3 buckets. What is the most likely reason, and what should be corrected?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Permission boundaries do not affect permissions for resources created with role chaining; enable role chaining instead to apply the boundary.

Permission boundaries are evaluated to limit the maximum effective permissions for the IAM principal regardless of role chaining. The symptom (being able to perform an action beyond the intended maximum) most commonly indicates that the intended boundary was not applied or was applied incorrectly.

B

Best answer

The boundary policy was not actually attached during role creation, or the automation tool attached the wrong boundary ARN; correct the role-creation request to set the intended PermissionBoundary.

Permission boundaries work by intersecting allowed actions from the role’s attached policies with the actions permitted by the boundary policy. If the automation tool fails to set the PermissionBoundary ARN (or sets an incorrect one), then the role can use the developer’s attached policies without the intended restriction. Fixing the PermissionBoundary parameter in the role creation call is the direct remedy.

C

Distractor review

KMS key policies override permission boundaries for S3, so deletion permission comes from the KMS policy; restrict the KMS key policy instead.

S3 bucket deletion authorization is governed by IAM permissions (and, where applicable, S3 bucket policies/ACLs). KMS key policies control access to cryptographic operations for KMS-encrypted data, not whether the caller can delete an S3 bucket.

D

Distractor review

Permission boundaries apply only to managed policies, not to inline policies; move the overly permissive permissions to a managed policy type to keep it bounded.

Permission boundaries apply to the effective permissions of the principal, regardless of whether the allowed actions come from inline policies or managed policies. If the boundary is correctly attached, both inline and managed policies are constrained by the boundary; moving to a managed policy does not address an incorrect/missing boundary attachment.

Common exam trap

Common exam trap: authentication is not authorization

Logging in proves the user can authenticate. It does not automatically mean the user is allowed to enter privileged or configuration mode. Watch for AAA authorization, privilege level and command authorization details.

Technical deep dive

How to think about this question

This kind of question is testing the difference between identity and permission. A user may successfully log in to a router because authentication is working, but still fail to enter configuration mode because authorization is missing, misconfigured or mapped to a lower privilege level.

KKey Concepts to Remember

  • Authentication checks who the user is.
  • Authorization controls what the user is allowed to do after login.
  • Privilege levels affect access to EXEC and configuration commands.
  • AAA, TACACS+ and RADIUS can separate login success from command access.

TExam Day Tips

  • Do not assume successful login means full administrative access.
  • Look for words such as cannot enter configuration mode, privilege level, authorization or command access.
  • Separate login problems from permission problems before choosing the answer.

Related practice questions

Related SAA-C03 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SAA-C03 question test?

Authentication checks who the user is.

What is the correct answer to this question?

The correct answer is: The boundary policy was not actually attached during role creation, or the automation tool attached the wrong boundary ARN; correct the role-creation request to set the intended PermissionBoundary. — Permission boundaries limit an IAM principal’s effective permissions by intersecting: (1) what the principal’s attached identity policies allow, with (2) what the boundary policy allows. If a role created by automation can still delete production S3 buckets despite the expectation of boundaries, the most likely cause is that the intended permission boundary was not applied during role creation (or the automation tool used the wrong PermissionBoundary ARN). The correction is to ensure the role-creation request explicitly sets the correct PermissionBoundary ARN from the security-approved policy. Option A is incorrect because role chaining does not “bypass” permission boundaries in the way described. Option C misattributes control-plane authorization: KMS key policies do not grant S3 bucket deletion permissions. Option D is incorrect because permission boundaries constrain effective permissions even when the excessive permissions are in inline policies; the real issue is typically the boundary attachment rather than the policy type.

What should I do if I get this SAA-C03 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.