What should the Security Engineer do to meet these requirements?

1 Comment

  1. Anthony
    Author

    I infer that the answer is:
    Create an IAM permissions boundary policy that allows Amazon EC2 access. Associate the contractor’s IAM account with the IAM permissions boundary policy.

Leave a Reply

Your email address will not be published. Required fields are marked *

1 + 6 =