Q: 15
A company has security requirements for Amazon Aurora MySQL databases regarding encryption,
deletion protection, public access, and audit logging. The company needs continuous monitoring and
real-time visibility into compliance status.
Which solution will meet these requirements?
Options
Discussion
B , saw something like this in a mock, Config managed rules hit all the Aurora MySQL points needed.
C
Not C, since Security Hub config policies won't give deep Aurora MySQL rule checks. B is correct.
Probably B here, Config managed rules directly track those Aurora settings. C is more for aggregating results across services.
B imo. AWS Config's managed rules cover encryption, public access, deletion protection, and logging right out of the box for Aurora MySQL. You get real-time compliance without custom code. Pretty sure that's what they're asking for but let me know if I'm missing something.
Yeah, B. Config managed rules fit Aurora MySQL compliance checks.
B tbh, Config managed rules are made for this kind of continuous compliance on Aurora MySQL. Simple and does exactly what's needed.
B , since managed Config rules do all the compliance checks listed for Aurora MySQL. Keeps monitoring continuous and real-time.
Probably B here. AWS Config has those managed rules for Aurora MySQL that actually check encryption, public access, deletion protection, and audit logging individually. Security Hub is broader but doesn't give that Aurora-level granularity out of the box. Pretty confident but open to other thoughts if someone's seen a new Security Hub update.
B , Config managed rules are Aurora MySQL aware so fits the compliance ask better than C I think.
Be respectful. No spam.