AWS Certified Solutions Architect Professional SAP-C02 Practice Question
A financial services company utilizes a multi-account AWS environment with a hub-and-spoke network architecture centered around an AWS Transit Gateway. The security team is mandated to perform deep packet inspection (DPI) on all east-west traffic between spoke VPCs. The inspection must be conducted by a fleet of third-party intrusion detection system (IDS) appliances deployed on EC2 instances within a dedicated 'inspection' VPC. The solution must be highly scalable, have minimal performance impact on application workloads, and centralize the inspection tooling. Which approach should a solutions architect recommend to meet these requirements?
Deploy AWS Network Firewall in the inspection VPC. Configure the Transit Gateway to route all inter-VPC traffic through the Network Firewall endpoints for inspection.
Configure VPC Flow Logs for all traffic in the spoke VPCs. Stream the logs to a central Amazon S3 bucket and use Amazon Athena for analysis.
In the inspection VPC, configure a Gateway Load Balancer (GWLB) with the IDS appliance fleet as a target group. Create GWLB Endpoints in each spoke VPC and modify route tables to direct all traffic through the GWLB.
Configure VPC Traffic Mirroring on the source Elastic Network Interfaces (ENIs) in the spoke VPCs. Set the mirror target to a Network Load Balancer (NLB) in the inspection VPC that fronts the IDS appliance fleet.
The correct answer is to configure VPC Traffic Mirroring on the relevant ENIs and set the target to a Network Load Balancer (NLB) in the inspection VPC. VPC Traffic Mirroring is designed to copy network traffic from an Elastic Network Interface (ENI) and forward it to a target for out-of-band inspection. This is the ideal solution for an Intrusion Detection System (IDS), which passively analyzes traffic without being in the direct path. Using a Network Load Balancer as the target allows the mirrored traffic to be distributed across a fleet of IDS appliances, ensuring scalability and high availability. This approach has minimal performance impact because it duplicates the traffic rather than routing it through the appliances, avoiding any added latency or a potential single point of failure in the production traffic path.
Incorrect: Enabling VPC Flow Logs is incorrect because Flow Logs capture metadata about IP traffic (e.g., source/destination IPs, ports, protocol) but do not capture the actual packet payloads. Deep packet inspection (DPI) requires analyzing the full packet content, which is not available in Flow Logs.
Incorrect: Deploying AWS Network Firewall is incorrect because the requirement is to use a specific fleet of third-party IDS appliances. AWS Network Firewall is a managed AWS service and would not fulfill this explicit requirement.
Incorrect: Using a Gateway Load Balancer (GWLB) in an in-line configuration is incorrect for this use case. A GWLB is designed to transparently insert appliances into the traffic path for in-line inspection, which is typical for an Intrusion Prevention System (IPS). Since the requirement is for a passive IDS, routing all traffic through the appliances would add unnecessary latency and complexity. The more appropriate and less impactful solution is to copy the traffic using Traffic Mirroring.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is VPC Traffic Mirroring and how does it work?
Open an interactive chat with Bash
How does a Network Load Balancer (NLB) support scalability for IDS appliances?
Open an interactive chat with Bash
Why is VPC Flow Logs insufficient for deep packet inspection (DPI)?
Open an interactive chat with Bash
AWS Certified Solutions Architect Professional SAP-C02
Design Solutions for Organizational Complexity
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access