A company's security policy requires that all Amazon S3 buckets must have server-side encryption with AWS Key Management Service (SSE-KMS) enabled. The SysOps administrator needs to automatically detect any existing or new S3 bucket that does not have SSE-KMS enabled and automatically apply the encryption configuration. The solution must use managed AWS services with minimal custom code. Which combination of AWS services should be used?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Best answer
Use AWS Config with a custom rule backed by an AWS Lambda function that checks if 'x-amz-server-side-encryption' is 'aws:kms' and auto-remediates by attaching a bucket policy that denies PUTs without SSE-KMS.
This uses AWS Config for detection and Lambda for remediation, which is a standard pattern. Bucket policy approach prevents future unencrypted uploads but does not encrypt existing objects; however, the requirement is to apply encryption configuration, which can be done via put-bucket-encryption API. The Lambda can call that API. This is a valid solution with managed services and minimal custom code (only the Lambda).
Distractor review
Enable default encryption on the AWS account's S3 buckets using an S3 account-level setting in the S3 console, which automatically applies SSE-KMS to all new buckets.
There is no account-level default encryption for all S3 buckets. Default encryption must be configured per bucket. This option is not feasible.
Distractor review
Create an AWS CloudTrail event that triggers an AWS Lambda function when a bucket is created, and the Lambda applies SSE-KMS encryption. Use AWS Config to periodically scan existing buckets and apply encryption.
While this could work, it uses CloudTrail events for bucket creation and a separate periodic Lambda for existing buckets. This is more complex and requires two Lambda functions, whereas AWS Config can handle both detection and remediation in a unified way.
Distractor review
Use AWS Identity and Access Management (IAM) with a Service Control Policy (SCP) that denies any S3 bucket creation without SSE-KMS enabled, and use AWS Config to detect and notify on non-compliance.
SCP can prevent creation of buckets without encryption but does not remediate existing buckets. The requirement includes detecting and remediating both existing and new buckets. This solution only addresses new buckets and does not automatically apply encryption to existing ones.
Common exam trap
Common exam trap: NAT rules depend on direction and matching traffic
NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.
Technical deep dive
How to think about this question
NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.
KKey Concepts to Remember
- Static NAT maps one inside address to one outside address.
- PAT allows many inside hosts to share one public address using ports.
- Inside local and inside global describe the private and translated addresses.
- NAT ACLs identify traffic for translation, not always security filtering.
TExam Day Tips
- Identify inside and outside interfaces first.
- Check whether the scenario needs static NAT, dynamic NAT or PAT.
- Do not confuse NAT matching ACLs with normal packet-filtering intent.
Related practice questions
Related SOA-C02 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A company uses Amazon CloudFront to deliver content to a global audience. The origin is an Application Load Balancer in us-east-1. The SysOps administrator wants to reduce costs by minimizing the number of requests that reach the origin server. Which action should the administrator take?
Question 2
A company runs a batch processing application on Amazon EC2 that runs for 2 hours every night. The workload can tolerate interruptions. Which EC2 purchasing option provides the lowest cost for this use case?
Question 3
A SysOps administrator needs to monitor the CPU utilization of an Amazon RDS DB instance and receive an alarm when CPU utilization exceeds 80% for 5 consecutive minutes. Which AWS service should be used to create this alarm?
Question 4
A company runs a critical web application on Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer (ALB). The application uses session stickiness (sticky sessions) to maintain user sessions. The SysOps administrator notices that when instances are replaced during a scale-in or failure event, users lose their session data. The administrator needs to preserve session data across instance failures without losing stickiness benefits. What should the administrator do?
Question 5
A company runs a production web application on a single Amazon EC2 instance. The application experiences a predictable and steady workload 24/7. The SysOps administrator wants to minimize compute costs for this instance while ensuring it remains available during the expected workload. Which EC2 purchasing option should the administrator use?
Question 6
A company has a VPC with public and private subnets. The private subnets host application servers that need to make outbound HTTPS connections to the internet. The SysOps administrator must implement a solution that provides outbound internet connectivity while preventing inbound connections from the internet. Additionally, the solution must allow the company to control which domains the application servers can access. Which solution should the administrator implement?
FAQ
Questions learners often ask
What does this SOA-C02 question test?
Static NAT maps one inside address to one outside address.
What is the correct answer to this question?
The correct answer is: Use AWS Config with a custom rule backed by an AWS Lambda function that checks if 'x-amz-server-side-encryption' is 'aws:kms' and auto-remediates by attaching a bucket policy that denies PUTs without SSE-KMS. — AWS Config provides managed rules such as 's3-bucket-server-side-encryption-enabled' which can check if buckets have encryption enabled, but that rule does not enforce SSE-KMS specifically. A custom rule using AWS Config with a Lambda function can check for SSE-KMS. However, the question asks for minimal custom code. AWS Config also supports automatic remediation via Systems Manager Automation documents. There is a managed remediation action for S3 bucket encryption, but it may not be SSE-KMS specific. A simpler managed approach is to use S3 Bucket Policies to deny PUTs without encryption, but that doesn't retroactively fix existing buckets. AWS Config can be used with a managed rule 's3-bucket-ssl-requests-only' but that's for SSL. the best combination is to use AWS Config with the managed rule 's3-bucket-server-side-encryption-enabled' (which checks for any server-side encryption, not just SSE-KMS) and then use AWS Config remediation with a Systems Manager Automation document to apply SSE-KMS to non-compliant buckets. However, the automation document may need to be created or customized. Alternatively, use AWS Service Catalog to enforce encryption at creation. The least custom code approach is to use AWS Config with a managed rule and then use AWS Lambda for remediation if no managed automation exists. But there is a pre-built AWS Config managed rule 's3-bucket-server-side-encryption-enabled' and an associated remediation action that enables SSE-S3. To enforce SSE-KMS, a custom Lambda is needed. But let's look for an option that uses AWS Config with a managed rule plus SCP? SCP can prevent creation without encryption but does not remediate existing. The best answer likely uses a combination of AWS Config with a custom rule (which requires some code) but the question says minimal custom code. However, among options, one may suggest using AWS Config + Systems Manager Automation with a pre-built document for SSE-KMS? There is no pre-built one for SSE-KMS. So the correct approach is: use AWS Config with a custom rule (Lambda) to detect non-compliance, and a remediation action using another Lambda to apply SSE-KMS. That's minimal but not zero code. Let's craft the answer based on AWS best practices: Use AWS Config with a custom AWS Lambda rule that checks for SSE-KMS, and AWS Config auto-remediation that calls a Lambda function to modify the bucket. This is a common pattern. The correct option should mention that.
What should I do if I get this SOA-C02 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.