
Ultimate access to all questions.
Deep dive into the quiz with AI chat providers.
We prepare a focused prompt with your quiz and certificate details so each AI can offer a more tailored, in-depth explanation.
A media company hosts its website on AWS. The website application's architecture includes a fleet of Amazon EC2 instances behind an Application Load Balancer (ALB) and a database that is hosted on Amazon Aurora. The company's cybersecurity team reports that the application is vulnerable to SQL injection.
How should the company resolve this issue?
A
Use AWS WAF in front of the ALB. Associate the appropriate web ACLs with AWS WAF.
B
Create an ALB listener rule to reply to SQL injections with a fixed response.
C
Subscribe to AWS Shield Advanced to block all SQL injection attempts automatically.
D
Set up Amazon Inspector to block all SQL injection attempts automatically.
Explanation:
Correct Answer: A
AWS WAF (Web Application Firewall) is specifically designed to protect web applications from common web exploits, including SQL injection attacks. By deploying AWS WAF in front of the ALB and configuring appropriate web ACLs (Access Control Lists) with SQL injection protection rules, the company can effectively mitigate SQL injection vulnerabilities.
Why other options are incorrect:
B: ALB listener rules are used for routing traffic based on conditions like path patterns or host headers, not for security protection against SQL injection. ALB cannot inspect application-layer payloads for SQL injection patterns.
C: AWS Shield Advanced is a DDoS (Distributed Denial of Service) protection service, not designed to protect against SQL injection attacks. While it provides advanced DDoS protection, it doesn't inspect application-layer content for SQL injection patterns.
D: Amazon Inspector is an automated security assessment service that helps identify security vulnerabilities and deviations from best practices, but it does not actively block attacks. It's a vulnerability assessment tool, not a real-time protection service.
Key AWS Services for SQL Injection Protection:
Best Practice: The company should implement AWS WAF with SQL injection protection rules while also addressing the root cause by implementing proper input validation and parameterized queries in their application code.