Which combination of steps should the security team take so that the automation can capture EC2 forensic evidence in all AWS accounts in the organization?

1 Comment

  1. Mary
    Author

    If I had to guess, I’d say the answer is:
    In the target AWS account, create a customer managed KMS key. Update the automation’s IAM role to allow the kms:Encrypt, kms:Decrypt, kms:GenerateDataKey*, and kms:CreateGrant actions.

Leave a Reply

Your email address will not be published. Required fields are marked *

four × 2 =