Ultimate access to all questions.
A company is planning to migrate its website from an on-premises data center to AWS and adopt a containerized microservice architecture to enhance availability and cost efficiency. The company's security policy mandates that privileges and network permissions be configured using the principle of least privilege. A solutions architect needs to design a containerized architecture that adheres to these security requirements and has already deployed the application on an Amazon ECS cluster. What post-deployment steps are necessary to fulfill the security requirements? (Select two options.)