AWS · SCS-C03

Compliance Misconception — AWS Security Specialty (SCS-C03)

You assumed a compliance or governance model that doesn't match the service's actual capabilities.

Encryption Isn't a Compliance Framework

The scenario describes a workload subject to a specific regulatory requirement — data residency, audit trail continuity, or enforcement scope. The distractor applies encryption and access controls, which feel compliance-adjacent. But the exam isn't asking whether the data is protected; it's asking whether the protection satisfies the named framework's specific obligations. KMS encryption doesn't establish a GDPR data-residency boundary. CloudTrail logging doesn't fulfill PCI-DSS cardholder data audit requirements unless the trail scope is correct. Read the constraint precisely, then match the control to it.

26%of exam questions affected (51 of 193)

The Scenario

A healthcare company needs to store patient data in AWS in a HIPAA-compliant manner. You recommend S3 with SSE-KMS encryption and HTTPS-only bucket policies. Both are necessary but not sufficient. HIPAA compliance on AWS requires: (1) a signed Business Associate Agreement with AWS, (2) using only BAA-eligible services (S3, RDS, DynamoDB, Lambda, and ~160 others — but not all services), (3) enabling CloudTrail for audit logging, (4) VPC configuration to prevent data exfiltration. The question tests whether you know the full compliance chain — encryption is one layer, not the whole answer.

How to Spot It

  • HIPAA, PCI-DSS, and FedRAMP each require specific contractual agreements on top of technical controls. The BAA for HIPAA, the AOC for PCI-DSS, and FedRAMP authorization for government workloads. The exam tests whether you know these agreements exist and are prerequisites.
  • Not all AWS services are eligible for every compliance framework. AWS Artifact lists which services are in scope for which certifications. The exam may offer an answer using a service that is technically capable but not in the compliance scope — that answer is wrong.
  • Compliance requires continuous controls: audit logging (CloudTrail), configuration monitoring (Config), access reviews (IAM Access Analyzer), and encryption verification. A one-time configuration does not maintain compliance. The exam tests whether your answer includes ongoing controls, not just initial setup.

Decision Rules

Whether deploy-time gating via Service Catalog launch constraints satisfies a zero-tolerance PCI-DSS deployment consistency mandate, versus post-deployment detection-and-remediation via AWS Config rules which leaves an inherent non-compliant window.

AWS Service CatalogAWS CloudFormationAWS Config

Whether AWS Config organizational rules feeding Security Hub's PCI-DSS standard (configuration-compliance monitoring) or Amazon GuardDuty (threat detection) satisfies the requirement to alert on configuration deviations against a named compliance framework across all member accounts.

AWS Security HubAWS ConfigAmazon GuardDuty

Whether to enforce per-tenant data isolation by attaching an inline session policy to the STS AssumeRole call versus applying IAM permission boundaries to the shared role — one scopes the effective credentials to the tenant context at issuance time, the other only caps the permission ceiling and requires an identity policy to grant anything, providing no session-level tenant isolation.

AWS Identity and Access Management (IAM)AWS Security Token Service (AWS STS)Amazon Verified Permissions

Should MFA enforcement be delegated to the IdP SAML assertion and trusted by STS, or enforced independently at the AWS authentication boundary before credentials are issued?

AWS IAM Identity CenterAWS Security Token Service (AWS STS)AWS CloudTrail

Whether STS AssumeRole with an inline session policy containing tenant-scoped resource conditions, or an IAM permission boundary attached to the shared execution role, satisfies both the anti-role-proliferation constraint and the compliance requirement for per-request authorization enforcement evidence.

AWS Security Token Service (AWS STS)AWS Identity and Access Management (IAM)Amazon Verified Permissions

When a compliance mandate explicitly names FIPS 140-2 Level 3 hardware key custody AND requires automated rotation without manual re-import, CloudHSM is the correct service boundary — standard KMS operates at Level 2 and KMS imported key material does not support automatic rotation, requiring manual re-import on every rotation cycle.

AWS CloudHSMAWS Key Management Service (AWS KMS)AWS Secrets Manager

Whether the selected ELB security policy enforces TLS 1.2 as the minimum negotiated protocol version (blocking TLS 1.0 and 1.1 entirely) rather than only advertising TLS 1.2 among several accepted versions, and whether the backend target group path avoids any public-IP exposure.

Elastic Load Balancing (ELB)AWS Certificate Manager (ACM)Amazon VPC

Whether to fix the CloudWatch Logs destination log group resource policy (precise, least-privilege) versus broadening the cross-account IAM role's trust or inline permissions — the latter unblocks nothing because CloudWatch Logs enforces its own resource-policy gate independently of IAM.

AWS CloudTrailAmazon CloudWatchAWS Identity and Access Management (IAM)

Whether to terminate the instance immediately for speed-of-recovery — permanently destroying volatile memory and disk forensic state — or execute a forensic-safe containment-first sequence (isolate via security group quarantine, snapshot EBS volumes, preserve volatile memory) before eradication, which is the only approach that satisfies evidence-integrity and chain-of-custody governance requirements.

Amazon GuardDutyAutomated Forensics Orchestrator for Amazon EC2AWS CloudTrail

Which service enforces vulnerability assessment at AMI build time versus which services operate at runtime, and why substituting a runtime detection service (GuardDuty) or a runtime patching service (Patch Manager) for a build-time gate fails the PCI-DSS pre-deployment control requirement.

EC2 Image BuilderAmazon InspectorAWS Systems Manager

Whether stateful L3/L4 controls (security groups, NACLs) satisfy the PCI-DSS east-west IDS/IPS inspection mandate, or whether an L7-capable stateful inspection engine (Network Firewall with IPS rule groups) is required at a centralized enforcement point reached via Transit Gateway routing.

AWS Network FirewallAWS Transit GatewayAmazon VPC

Whether vulnerability compliance is enforced at build time by integrating Inspector into an EC2 Image Builder pipeline as a blocking gate (correct: produces an auditor-presentable scan report tied to each published AMI) or delegated to runtime GuardDuty or continuous Inspector scanning (compliance misconception: runtime detection cannot retroactively satisfy a pre-deployment gate requirement that PCI-DSS Requirement 6.3 demands).

EC2 Image BuilderAmazon InspectorAWS Systems Manager

Choose the service combination that satisfies continuous customer-resource compliance detection (AWS Config rules) AND organized audit-evidence collection (AWS Audit Manager), and disqualify options that substitute static AWS-side attestation retrieval (AWS Artifact) for either phase.

AWS ConfigAWS Audit ManagerAWS Artifact

Domain Coverage

DetectionIncident ResponseInfrastructure SecurityIdentity and Access ManagementData ProtectionSecurity Foundations and Governance

Difficulty Breakdown

Hard: 47Medium: 4

Related Patterns