Secure Architecture IV
Explore solutions to secure and optimize AWS architectures by applying AWS WAF for web attack protection, leveraging GuardDuty for threat monitoring, and implementing encryption and access controls. Understand how to secure CloudFront distributions, protect sensitive data, and maintain compliance while ensuring high availability and cost-efficiency.
We'll cover the following...
Question 33
A company hosts a highly popular web application on Amazon S3, which serves static and dynamic content. To ensure global availability and low latency, it uses Amazon CloudFront as a content delivery network (CDN). Recently, the company has faced security challenges such as SQL injection and cross-site scripting (XSS) attacks, which have compromised the integrity of its web application. The company wants to enhance the security and performance of its CloudFront distribution without significantly impacting performance, increasing costs, or complexity.
As a solutions architect, recommend a solution that fulfills the requirements.
A. Enable geo-restriction to restrict access based on the geographic location of the users.
B. Configure CloudFront to use AWS WAF (Web Application Firewall) to protect against common web exploits.
C. Enable AWS Shield Standard to protect the CloudFront distribution from SQL injection and cross-site scripting (XSS) attacks.
D. Configure AWS ...