Review questions
- You have been brought into a company that wants to start implementing CI/CD for their builds. This company has recently gone through a security posture analysis assessment and needs to make sure that any solution implemented is secure in nature. If any vulnerability is found after implementation, there then needs to be a plan for remediation, and action must be taken to remedy the vulnerability.
- After setting up the pipeline builds in AWS CodePipeline, which further steps can you take to ensure that no underlying access on the S3 buckets is available, which you created during the process?
a. Every 15 days, use the Trusted Advisor service to check and see whether there is a misformed bucket policy for the S3 bucket. If the S3 bucket shows up in the vulnerable access list, then craft a bucket access policy that will only allow for the CodePipeline service account to access that bucket.
b. Turn on logging for the S3 bucket. Add versioning to the newly created...