Ultimate access to all questions.
A company utilizes infrastructure as code (IaC) to manage its AWS infrastructure, employing AWS CloudFormation templates for deployment. They have an established CI/CD pipeline for this purpose. Following a security audit, the company aims to enhance its AWS security posture by implementing a policy-as-code approach. This approach must prevent the deployment of infrastructure that violates security policies, such as unencrypted Amazon Elastic Block Store (Amazon EBS) volumes. Which solution should the company adopt to meet these security requirements?