AWS Certified Solutions Architect Professional SAP-C02 Practice Question
A financial services company is modernizing a legacy application into a container-based microservices architecture running on Amazon ECS. The application requires credentials for an Amazon RDS for PostgreSQL database and several third-party APIs. The company operates separate AWS accounts for development and production environments. A key security requirement is that all secrets must be automatically rotated on a schedule, with database credentials rotated every 30 days. The solution must support cross-account access for a centralized CI/CD pipeline and provide detailed auditing of secret access and usage. The company wants to use a fully managed AWS service to minimize operational overhead. Which strategy should a solutions architect recommend for managing these secrets?
Deploy a high-availability HashiCorp Vault cluster on a fleet of Amazon EC2 instances. Configure Vault's AWS secrets engine for dynamic RDS credentials and enable cross-account access using Vault policies.
Store credentials in AWS Secrets Manager. Configure automatic rotation for the RDS database secret and use resource-based policies to grant the CI/CD pipeline's IAM role cross-account access to the required secrets.
Encrypt the secret values using an AWS KMS customer-managed key and store the resulting ciphertext files in a central Amazon S3 bucket. Apply a bucket policy and KMS key policy to restrict access to the CI/CD pipeline's IAM role.
Store credentials as advanced-tier parameters in AWS Systems Manager (SSM) Parameter Store. Use AWS RAM to share the parameters with the production account and create a scheduled Lambda function to handle secret rotation.
The correct strategy is to use AWS Secrets Manager. Secrets Manager is a purpose-built AWS service for managing the lifecycle of secrets, including credentials, API keys, and other tokens. It natively supports automatic rotation for services like Amazon RDS, which directly meets the 30-day rotation requirement for the PostgreSQL database without custom scripting. Secrets Manager provides fine-grained access control using IAM policies and resource-based policies, which facilitates secure cross-account access for the CI/CD pipeline. All API calls to Secrets Manager are logged in AWS CloudTrail, providing the detailed auditing required.
Using AWS Systems Manager (SSM) Parameter Store with advanced-tier parameters is a plausible but less optimal choice. While it can store secrets and supports cross-account sharing, it does not offer built-in, automated rotation for RDS in the same way Secrets Manager does; rotation with SSM typically requires creating and managing a custom AWS Lambda function.
Storing encrypted secret files in an Amazon S3 bucket with AWS KMS requires significant custom development. The team would need to build and maintain the logic for encryption, decryption, access control, and a custom solution for rotation, which increases operational overhead and complexity compared to a managed service like Secrets Manager.
Hosting HashiCorp Vault on Amazon EC2 is a powerful solution but contradicts the requirement to minimize operational overhead. This approach requires the company to manage the installation, high availability, patching, and maintenance of the Vault cluster and its underlying infrastructure, whereas AWS Secrets Manager is a fully managed service.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is AWS Secrets Manager?
Open an interactive chat with Bash
How does AWS Secrets Manager handle automatic secret rotation?
Open an interactive chat with Bash
What are resource-based policies in AWS Secrets Manager?
Open an interactive chat with Bash
AWS Certified Solutions Architect Professional SAP-C02
Continuous Improvement for Existing Solutions
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access