What should the Security Engineer do to meet these requirements?

1 Comment

  1. Anthony
    Author

    I infer that the answer is:
    Create an IAM permissions boundary policy that allows Amazon EC2 access. Associate the contractor’s IAM account with the IAM permissions boundary policy.

Leave a Reply to Anthony Cancel reply

Your email address will not be published. Required fields are marked *

four × three =