Which combination of steps should the security engineer take to meet these requirements?

1 Comment

  1. Adam
    Author

    From my point of view, the answer is:
    In the development account, configure an IAM role for the new Lambda function. Attach an IAM policy that allows access to the KMS key in the security account.

Leave a Reply

Your email address will not be published. Required fields are marked *

two × two =