Question:
A company is using multiple AWS accounts and has multiple DevOps teams running production and non-production workloads in these accounts. The company would like to centrally-restrict access to some of the AWS services that the DevOps teams do not use. The company decided to use AWS Organizations and successfully invited all AWS accounts into the Organization. They would like to allow access to services that are currently in-use and deny a few specific services. Also they would like to administer multiple accounts together as a single unit. What combination of steps should the solutions architect take to satisfy these requirements? (Choose three.) A. Use a Deny list strategy. B. Review the Access Advisor in AWS IAM to determine services recently used C. Review the AWS Trusted Advisor report to determine services recently used. D. Remove the default FullAWSAccess SCP. E. Define organizational units (OUs) and place the member accounts in the OUs. F. Remove the default DenyAWSAccess SCP.
Author: Jorge SoroceAnswer:
Use a Deny list strategy. Review the Access Advisor in AWS IAM to determine services recently used Define organizational units (OUs) and place the member accounts in the OUs
0 / 5 Â (0 ratings)
1 answer(s) in total