Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
How should a company grant applications on Amazon EC2 instances access to configuration files stored in an S3 bucket following AWS security best practices?
A
By using the AWS account root user access keys.
B
By using the AWS access key ID and the EC2 secret access key.
C
By using an IAM role with the necessary permissions.
D
By activating multi-factor authentication (MFA) and versioning on the S3 bucket.