Which approach should the security officer take to meet these requirements?

2 Comments

  1. Mark
    Author

    I outline that the answer is:
    Federate AWS Identity and Access Management (IAM) with the external company’s identity provider. Create an IAM role and attach a policy with the necessary permissions.

  2. Tyler
    Author

    As I see it, the answer is:
    Federate AWS Identity and Access Management (IAM) with the external company’s identity provider. Create an IAM role and attach a policy with the necessary permissions.

Leave a Reply

Your email address will not be published. Required fields are marked *

15 − fourteen =