
AWS Certified Developer - Associate
Get started today
Ultimate access to all questions.
An AWS CodePipeline has been set up to be initiated by Amazon CloudWatch Events. Recently, the pipeline execution failed, and upon further scrutiny, the Team Lead discovered that the source repository had been altered from AWS CodeCommit to Amazon Simple Storage Service (S3). The Team Lead has now asked you to identify the user who was responsible for making these changes.
Which AWS service can assist you in determining the user who made these modifications?
An AWS CodePipeline has been set up to be initiated by Amazon CloudWatch Events. Recently, the pipeline execution failed, and upon further scrutiny, the Team Lead discovered that the source repository had been altered from AWS CodeCommit to Amazon Simple Storage Service (S3). The Team Lead has now asked you to identify the user who was responsible for making these changes.
Which AWS service can assist you in determining the user who made these modifications?
Explanation:
Overall explanation Correct option:
AWS CloudTrail
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides an event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command-line tools, and other AWS services.
AWS CloudTrail increases visibility into your user and resource activity by recording AWS Management Console actions and API calls. You can identify which users and accounts called AWS, the source IP address from which the calls were made, and when the calls occurred.