There are many questions asked to identify the best AWS service to detect unrestricted access over some ports.
1. You have been asked to investigate whether unrestricted SSH access is enabled to any of your EC2 instances. How should you approach this?
a. Use AWS Config to check which Security Groups are configured with unrestricted access
b. Use Kali Linux to run a penetration test
c. Use Trusted Advisor to report Security Groups configured with unrestricted access
d. Run an Inspector assessment using Runtime behavior analysis rule package
2. You have been asked to make sure that insecure protocols like Telnet and FTP are disabled on all of your EC2 instances. You would like to perform a regular automated review of your environment. Which of the following solutions will meet this requirement?
a. Use a Lambda scheduled event to launch Trusted Advisor to run a check on security best practices
b. Use a scheduled Lambda event to trigger AWS Config to evaluate the restricted-common-ports rule for every EC2 instance.
c. Use a CloudWatch Event to trigger AWS Config to evaluate the restricted-common-ports rule for every EC2 instance.
d. Use CloudWatch Events to schedule Amazon Inspector to complete a Runtime Behaviour Analysis check on every EC2 instance.
This is a clear answer as CloudWatch Events can only trigger Inspector but not Config or Trusted Advisor.
Can we draw a line on which service to use; based on different conditions like cost, low maintenance, ease of deployment, feature etc?