Which approach should the security officer take to meet these requirements?

1 Comment

  1. Mark
    Author

    I outline that the answer is:
    Federate AWS Identity and Access Management (IAM) with the external company’s identity provider. Create an IAM role and attach a policy with the necessary permissions.

Leave a Reply

Your email address will not be published. Required fields are marked *

1 × 3 =