
AWS Certified Security - Specialty
Get started today
Ultimate access to all questions.
A company is expanding its store network and intends to deploy a customized web application for each new store upon opening. Each application will have distinct non-production and production environments, each hosted in separate AWS accounts. The company utilizes AWS Organizations, with a specific Organizational Unit (OU) designated for these accounts. The majority of the development tasks are assigned to external third-party teams. A security engineer has developed an AWS CloudFormation template to standardize the deployment process. The engineer's next task is to ensure that all development teams adhere to this standardized deployment plan, while also restricting access to the deployment details to only those developers who require it. What is the most secure method for the security engineer to proceed with these requirements?
A company is expanding its store network and intends to deploy a customized web application for each new store upon opening. Each application will have distinct non-production and production environments, each hosted in separate AWS accounts. The company utilizes AWS Organizations, with a specific Organizational Unit (OU) designated for these accounts. The majority of the development tasks are assigned to external third-party teams. A security engineer has developed an AWS CloudFormation template to standardize the deployment process. The engineer's next task is to ensure that all development teams adhere to this standardized deployment plan, while also restricting access to the deployment details to only those developers who require it. What is the most secure method for the security engineer to proceed with these requirements?