
Ultimate access to all questions.
A telecom service provider relies on Amazon Simple Storage Service (Amazon S3) for storing its essential customer information securely. Considering the need for stringent access controls to protect this sensitive data, which of the following options can be implemented to manage and restrict access to Amazon S3 data? (Select two)
A
Bucket policies, Identity and Access Management (IAM) policies
B
Query String Authentication, Permissions boundaries
C
Query String Authentication, Access Control Lists (ACLs)
D
Permissions boundaries, Identity and Access Management (IAM) policies
E
IAM database authentication, Bucket policies