AWS Certified CloudOps Engineer Associate SOA-C03 Practice Question

In an AWS Organizations environment, you need to record all management events from every member account and store them centrally in a security account. The security team insists that the logs be encrypted with a customer-managed KMS key that lives in the security account, and that no member account administrator can disable or delete the trail. Which approach satisfies these requirements with the least operational overhead?

  • Create an organization trail from the management (or delegated administrator) account that targets an S3 bucket in the security account, encrypt the bucket with a customer-managed KMS key in that account, and enable log file validation.

  • Send management events to CloudWatch Logs in each account and use cross-account subscription filters to push the logs to the security account; encrypt the logs with a customer-managed KMS key.

  • Create identical multi-region trails in every member account that write directly to the security account's S3 bucket using SSE-S3 encryption, and use AWS Config rules to monitor whether a trail is disabled.

  • Enable CloudTrail Lake in each account, export event data to an encrypted S3 bucket in the security account, and apply service control policies to block trail deletion.

AWS Certified CloudOps Engineer Associate SOA-C03
Monitoring, Logging, Analysis, Remediation, and Performance Optimization
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot