Which combination of steps must the security engineer take to meet these requirements?

2 Comments

  1. Christian
    Author

    As far as I can tell, the answer is:
    Add an outbound rule to the network ACL for the subnet that contains the compromised EC2 instance to deny traffic to 0.0.0.0/0 and port 587.

  2. Amber
    Author

    From my point of view, the answer is:
    Add an outbound rule to the network ACL for the subnet that contains the compromised EC2 instance to deny traffic to 0.0.0.0/0 and port 587.

Leave a Reply

Your email address will not be published. Required fields are marked *

seven + nine =