Which of the following accurately reflects the access control mechanisms the Architect should verify?
Outbound SG configuration on database servers Inbound SG configuration on application servers Inbound and outbound network ACL configuration on the database subnet Inbound and outbound network ACL configuration on the application server subnet
Inbound SG configuration on database servers Outbound SG configuration on application servers Inbound and outbound network ACL configuration on the database subnet Inbound and outbound network ACL configuration on the application server subnet
Inbound and outbound SG configuration on database servers Inbound and outbound SG configuration on application servers Inbound network ACL configuration on the database subnet Outbound network ACL configuration on the application server subnet
Inbound SG configuration on database servers Outbound SG configuration on application servers Inbound network ACL configuration on the database subnet Outbound network ACL configuration on the application server subnet
Explanations:
This option suggests checking the outbound SG configuration on database servers, which is not necessary as database servers do not initiate connections. Instead, the inbound configuration should be verified to allow traffic from application servers. Additionally, it correctly includes checking the inbound SG on application servers and network ACLs, but the focus is misplaced.
This option accurately identifies the need to verify the inbound SG configuration on database servers to allow connections from application servers. It also includes checking the outbound SG on application servers, which is crucial for ensuring they can send requests to the database servers. Furthermore, it appropriately addresses the need to check both inbound and outbound network ACLs for the respective subnets.
This option suggests checking both inbound and outbound SG configurations on database servers, which is unnecessary as database servers should only require inbound rules to allow traffic from application servers. It also states the need for inbound network ACL configuration on the database subnet, which is not specific enough without mentioning outbound rules.
This option correctly identifies the need for inbound SG configuration on database servers and outbound SG configuration on application servers. However, it fails to mention the need to verify inbound and outbound rules for network ACLs on both the database and application server subnets, which is crucial for overall connectivity.