Which of the following is a recommended best practice for network protection?

Disable ads (and more) with a premium pass for a one time $4.99 payment

Prepare for the Amazon Web Services (CISN 74A) Security Test with our interactive quizzes. Use multiple choice questions with detailed hints and explanations to ace your exam.

Using security groups to control access to resources is a fundamental best practice for network protection in AWS. Security groups act as virtual firewalls for your AWS resources, such as EC2 instances, allowing you to define inbound and outbound traffic rules. By setting these rules, you can specify which IP addresses or ranges are allowed to connect and which ports they can use, thereby minimizing exposure to potential threats. This granular control helps to ensure that only authorized traffic can reach your resources, which is essential for maintaining the overall security posture of your infrastructure.

Unlike options that suggest allowing unrestricted inbound traffic or isolating all resources in public subnets, which can significantly increase vulnerability, security groups provide a mechanism to limit access efficiently. Additionally, disabling VPC Flow logs would hinder your ability to monitor and audit traffic, making it difficult to detect unauthorized access or suspicious behavior. Thus, utilizing security groups is crucial for protecting network resources effectively.