Which solution will meet these requirements MOST securely?

1 Comment

  1. Ronald
    Author

    My best guess is:
    Create an IAM role in the company’s account to delegate access to the vendor’s IAM role. Attach the appropriate IAM policies to the role for the permissions that the vendor requires.

Leave a Reply

Your email address will not be published. Required fields are marked *

2 × 5 =