
Ultimate access to all questions.
A company is planning to migrate its website from an on-premises data center to AWS and adopt a containerized microservice architecture to enhance availability and cost efficiency. The company's security policy mandates that privileges and network permissions be configured using the principle of least privilege. A solutions architect needs to design a containerized architecture that adheres to these security requirements and has already deployed the application on an Amazon ECS cluster. What post-deployment steps are necessary to fulfill the security requirements? (Select two options.)
A
Create tasks using the bridge network mode.
B
Create tasks using the awsvpc network mode.
C
Apply security groups to Amazon EC2 instances and utilize IAM roles for EC2 instances to access other AWS resources.
D
Apply security groups to the tasks and inject IAM credentials into the container at launch time to access other AWS resources.
E
Apply security groups to the tasks and employ IAM roles for tasks to access other AWS resources.