Which combination of steps must the security engineer take to meet these requirements?

1 Comment

  1. Christian
    Author

    As far as I can tell, the answer is:
    Add an outbound rule to the network ACL for the subnet that contains the compromised EC2 instance to deny traffic to 0.0.0.0/0 and port 587.

Leave a Reply

Your email address will not be published. Required fields are marked *

one − 1 =