
Answer-first summary for fast verification
Answer: AWS CloudTrail
## Detailed Explanation **Correct Answer: B (AWS CloudTrail)** AWS CloudTrail is the appropriate service for identifying unauthorized access attempts to Amazon Bedrock because it provides comprehensive API activity logging across AWS services. Here's why: ### Why AWS CloudTrail is Optimal: 1. **API Activity Monitoring**: CloudTrail records all API calls made to AWS services, including Amazon Bedrock. This includes successful and failed authentication attempts, providing visibility into who accessed the service and when. 2. **Security and Compliance**: By analyzing CloudTrail logs, security teams can detect unauthorized access patterns, such as repeated failed authentication attempts from specific IP addresses or users, which helps identify potential security threats. 3. **IAM Policy Refinement**: The detailed logs from CloudTrail provide concrete evidence of access patterns, enabling data-driven decisions when creating or modifying IAM policies and roles. This ensures that permissions are granted based on actual usage patterns rather than assumptions. 4. **Integration with Other AWS Services**: CloudTrail logs can be sent to Amazon CloudWatch for real-time monitoring and alerting, or to Amazon S3 for long-term storage and analysis, facilitating automated responses to security incidents. ### Why Other Options Are Less Suitable: - **A: AWS Audit Manager**: This service helps automate compliance assessments and evidence collection against regulatory standards. While it can use CloudTrail data, its primary focus is on compliance reporting rather than real-time detection of unauthorized access attempts. - **C: Amazon Fraud Detector**: This is designed for detecting fraudulent online activities like payment fraud or fake account creation, not for monitoring API access to AWS services like Amazon Bedrock. - **D: AWS Trusted Advisor**: This service provides recommendations for cost optimization, performance, security, and fault tolerance based on AWS best practices. It does not log or monitor API activity, making it unsuitable for detecting unauthorized access attempts. ### Best Practice Consideration: For securing Amazon Bedrock, a layered security approach is recommended: 1. Use IAM policies to enforce least-privilege access. 2. Enable CloudTrail logging for all regions and integrate with monitoring tools. 3. Regularly review CloudTrail logs to identify and respond to unauthorized access attempts. 4. Use CloudTrail insights to detect unusual activity patterns automatically. This approach ensures that unauthorized access attempts are logged and analyzed, providing the necessary data to refine IAM policies and roles effectively.
Ultimate access to all questions.
No comments yet.
Author: LeetQuiz Editorial Team
Which AWS service should be used to detect unauthorized attempts to access Amazon Bedrock models in order to inform IAM policy and role adjustments?
A
AWS Audit Manager
B
AWS CloudTrail
C
Amazon Fraud Detector
D
AWS Trusted Advisor