Based on this requirement, what actions should be recommended for the start of the security review?

2 Comments

  1. Jacob
    Author

    I measure that the answer is:
    Review the security group’s inbound access rules for least privilege

  2. Timothy
    Author

    I deduce that the answer is:
    Review the security group’s inbound access rules for least privilege

Leave a Reply

Your email address will not be published. Required fields are marked *

9 − eight =