Which of the following describes a security best practice that can be implemented using AWS IAM?

Posted by: Pdfprep Category: CLF-C01 Tags: , ,

Which of the following describes a security best practice that can be implemented using AWS IAM?
A . Disable AWS Management Console access for all users
B . Generate secret keys for every IAM user
C . Grant permissions to users who are required to perform a given task only
D . Store AWS credentials within Amazon EC2 instances

Answer: C

Explanation:

Reference: https://cloudcheckr.com/cloud-security/top-5-iam-best-practices/

Leave a Reply

Your email address will not be published.