
Ultimate access to all questions.
In a single AWS account with multiple environments, a development team faces an issue where development S3 buckets are triggering production Lambda functions, causing unintended executions. To adhere to security best practices and prevent this, what is the appropriate solution?
A
Restrict the production Lambda function's execution role to only allow reading from the production S3 bucket.
B
Separate development and production into different AWS accounts and configure Lambda functions to only accept invocations from S3 buckets within the same account.
C
Implement a resource policy on the production Lambda to permit invocations exclusively from the production S3 bucket.
D
Enforce account separation for development and production, and update Lambda execution roles to interact only with S3 buckets in the respective accounts.