Which method enforces the required controls with the LEAST impact on the development process?

1 Comment

  1. Gary
    Author

    As I see it, the answer is:
    Use IAM policies to restrict the ability of users or other automated entities to launch EC2 instances based on a specific set of pre-approved AMIs, such as those tagged in a specific way by Information Security.

Leave a Reply

Your email address will not be published. Required fields are marked *

5 × four =