Which combination of steps should the security engineer take to meet these requirements?

2 Comments

  1. Adam
    Author

    From my point of view, the answer is:
    In the development account, configure an IAM role for the new Lambda function. Attach an IAM policy that allows access to the KMS key in the security account.

  2. Virginia
    Author

    I classify that the answer is:
    In the development account, configure an IAM role for the new Lambda function. Attach an IAM policy that allows access to the KMS key in the security account.

Leave a Reply

Your email address will not be published. Required fields are marked *

fifteen + 13 =