Which method enforces the required controls with the LEAST impact on the development process?

2 Comments

  1. Gary
    Author

    As I see it, the answer is:
    Use IAM policies to restrict the ability of users or other automated entities to launch EC2 instances based on a specific set of pre-approved AMIs, such as those tagged in a specific way by Information Security.

  2. Mary
    Author

    As I recall, the answer is:
    Use IAM policies to restrict the ability of users or other automated entities to launch EC2 instances based on a specific set of pre-approved AMIs, such as those tagged in a specific way by Information Security.

Leave a Reply

Your email address will not be published. Required fields are marked *

one × three =