Option B C and E for sure. Setting up the service role (B), scoping its permissions (C), then updating the stack (E) means CloudFormation always runs with the right access, not whatever random rights users have. PassRole (F) is user-side, but here we're standardizing deployment access. Pretty sure that's most secure-let me know if you see it differently.
Lifecycle rules are the way to go for this, so B. It lets you set automatic object expiration by hours or days, which is exactly what's needed for the 72-hour requirement. Official AWS docs and practice tests back this up. Pretty confident but always double-check by reviewing lifecycle configs if unsure.
Option A works because Macie is built for S3 data discovery and lets you handle multiple accounts from a central security account. Quick check though, did the question specify if all S3 buckets are in the same org? That would impact the setup.
AWS really likes to toss Trusted Advisor into these options but it's always Macie for actual sensitive data inventory across S3. A imo, since you need delegated admin to scan org-wide. Security Hub pulls it all together but Macie does the heavy lifting. Open to hearing if someone made D work in real setups.
Had something like this in a mock, pretty sure C is right. You want to save the EBS volumes by disabling delete on termination, then kill the compromised box so nothing else leaks. Forensics should always happen offline on a new host for clean analysis. Makes sense?
Does editing the key policy (like in B) actually scale if the application team needs access repeatedly but not all the time? Seems like grants (C) are less messy, but is there a downside I'm missing for temp access?
Definitely C. Creating a key grant gives temporary access with minimal overhead, and you don't have to modify the key policy like in B every time. That policy-editing approach is extra manual and risky for mistakes. Pretty sure this matches what AWS expects for temp access but happy to hear if anyone's seen otherwise?
Option A fits since GuardDuty handles detection automatically and scales across accounts with Organizations. If you want detection, Inspector or Athena won’t do it for you. Only caveat: if you need detailed custom rules, you might have to layer other solutions, but for least effort, A wins. Agree?
I get why C is tempting, but it only centralizes logs, doesn't do any auto detection. A (GuardDuty) is made for exactly this scenario and manages everything across accounts for you. Pretty sure A is the intended pick here, but open to hearing counterpoints.
Option C fits best here. Inspector is the specific AWS service that does vulnerability scans on both ECR images and Lambda code. B (GuardDuty) is tempting, but that's more about threat detection and runtime monitoring, not actual code or image vuln scanning. Pretty sure the key words are "identify vulnerabilities" not just monitor. Anyone see anything in the docs suggesting otherwise?