Which actions should a solutions architect lake to resolve the problem and prevent it from happening in the future?
(Choose three.)
Create an AWS Config rule in each account to find resources with missing tags.
Create an SCP in the organization with a deny action for ec2:RunInstances if the Project tag is missing.
Use Amazon Inspector in the organization to find resources with missing tags.
Create an IAM policy in each account with a deny action for ec2:RunInstances if the Project tag is missing.
Create an AWS Config aggregator for the organization to collect a list of EC2 instances with the missing Project tag.
Use AWS Security Hub to aggregate a list of EC2 instances with the missing Project tag.
Explanations:
Creating an AWS Config rule in each account can automatically assess whether the Project tag is present on EC2 instances. This allows for continuous compliance monitoring and helps identify instances that lack the required tag.
Implementing a Service Control Policy (SCP) that denies theec2:RunInstancesaction if the Project tag is missing enforces tag compliance at the organizational level. This prevents the launch of EC2 instances without the necessary tag from the start, effectively preventing the issue.
Amazon Inspector is primarily used for assessing the security and compliance of EC2 instances and does not focus on tag management. It cannot identify resources with missing tags, so it is not suitable for this requirement.
While creating an IAM policy to deny theec2:RunInstancesaction based on the presence of a Project tag might seem effective, IAM policies are not capable of evaluating the tags of resources dynamically at the time of the action. Thus, this method will not reliably enforce tagging compliance.
An AWS Config aggregator can be set up to collect compliance data across multiple accounts in an organization. By using this, the company can have a centralized view of EC2 instances with missing Project tags, which helps in monitoring and reporting for compliance.
AWS Security Hub is designed for security posture management and compliance checks but does not provide functionality to identify or manage resource tags. Therefore, it cannot be used to aggregate a list of EC2 instances with missing tags.