Which are security best practices that should be followed?

Posted by: Pdfprep Category: CLF-C01 Tags: , ,

A developer has been hired by a large company and needs AWS credentials.

Which are security best practices that should be followed? (Choose two.)
A . Grant the developer access to only the AWS resources needed to perform the job.
B . Share the AWS account root user credentials with the developer.
C . Add the developer to the administrator’s group in AWS IA
E . Configure a password policy that ensures the developer’s password cannot be changed.
F . Ensure the account password policy requires a minimum length.

Answer: AE

Leave a Reply

Your email address will not be published.