easymultiple choiceObjective-mapped

You must ensure that all requests to an S3 bucket use TLS (HTTPS). Which S3 bucket policy approach best enforces this requirement for S3 access?

Question 1easymultiple choice
Full question →

You must ensure that all requests to an S3 bucket use TLS (HTTPS). Which S3 bucket policy approach best enforces this requirement for S3 access?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Allow all principals to GetObject when aws:SecureTransport is true

Allow-only approaches can be bypassed if other policy statements (identity-based or bucket policies) allow non-TLS requests. To enforce TLS for everyone regardless of other allows, you need an explicit Deny for non-TLS traffic.

B

Best answer

Use a policy statement that explicitly Denies any action when aws:SecureTransport is false

A bucket policy statement with Effect = Deny and a condition aws:SecureTransport = false blocks non-HTTPS requests. Because explicit Deny overrides Allow during policy evaluation, this prevents access for any request that does not use TLS, even if other statements grant permissions.

C

Distractor review

Deny requests only when the bucket name is not matched exactly in the request

Bucket-name matching controls which bucket is targeted, not whether the request is made over TLS. An attacker can still send non-TLS requests while specifying the correct bucket name.

D

Distractor review

Require that the requester uses SSE-KMS and reject requests without SSE-KMS configuration

SSE-KMS controls encryption at rest (data stored in S3), not encryption in transit. A request can use non-TLS transport while still using SSE-KMS, so it does not meet the TLS requirement.

Common exam trap

Common exam trap: ACLs stop at the first match

ACLs are processed top to bottom. The first matching entry wins, and an implicit deny usually exists at the end.

Technical deep dive

How to think about this question

ACL questions test precision: source, destination, protocol, port and direction. A generally correct ACL can still fail if it is applied on the wrong interface or in the wrong direction.

KKey Concepts to Remember

  • Standard ACLs match source addresses.
  • Extended ACLs can match source, destination, protocol and ports.
  • The first matching ACL entry is used.
  • There is usually an implicit deny at the end.

TExam Day Tips

  • Check inbound versus outbound direction.
  • Read the ACL from top to bottom.
  • Look for a broader permit or deny above the intended line.

Related practice questions

Related SAA-C03 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SAA-C03 question test?

Standard ACLs match source addresses.

What is the correct answer to this question?

The correct answer is: Use a policy statement that explicitly Denies any action when aws:SecureTransport is false — Enforce TLS by adding an S3 bucket policy statement that explicitly Denies requests when aws:SecureTransport is false. This ensures that any request not made over HTTPS/TLS is rejected. The Deny statement is evaluated with higher precedence than any Allow statements, so it cannot be overridden by other bucket or IAM policy permissions. Allow statements conditioned only on aws:SecureTransport can still leave gaps if other policy statements allow non-TLS traffic. Denying based on bucket-name mismatch is unrelated to transport security. SSE-KMS relates to encryption at rest, not to TLS in transit.

What should I do if I get this SAA-C03 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.