
Ultimate access to all questions.
Your organization is using AWS Security Hub to collect and organize evidence of compliance with various security policies. Describe how you would use Security Hub to identify and remediate noncompliant AWS resources, and provide an example of a security policy that could be enforced through this process.
A
Use Security Hub to collect and organize evidence of compliance, and then use AWS Config rules to automatically detect and remediate noncompliant resources. Example: A security policy requiring all S3 buckets to have server-side encryption enabled.
B
Use Security Hub to collect and organize evidence of compliance, and then use AWS Lambda functions to automatically detect and remediate noncompliant resources. Example: A security policy requiring all EC2 instances to have a specific set of security groups attached.
C
Use Security Hub to collect and organize evidence of compliance, and then use AWS CloudTrail to automatically detect and remediate noncompliant resources. Example: A security policy requiring all RDS instances to be in a specific VPC.
D
Use Security Hub to collect and organize evidence of compliance, and then use AWS Audit Manager to manually review and remediate noncompliant resources. Example: A security policy requiring all Lambda functions to have a specific set of IAM permissions.