
Explanation:
The correct answer is C.
The company needs both:
Key steps in Option C:
Use Tag Editor to bulk-apply the required tags (cost center and project ID) to all existing eligible resources across multiple accounts.
Tag Editor is a centralized console tool (and has API support) that lets you search and tag resources like RDS DB instances and DynamoDB tables in one or more accounts/regions without needing custom scripts.
Activate the tags as cost allocation tags in the AWS Billing console (under Cost allocation tags).
This makes the tags visible in Cost Explorer, Cost and Usage Reports, and consolidated billing across the AWS Organization. Activation typically takes up to 24 hours (sometimes longer for full propagation in billing data).
Enforce tagging for new resources using Service Control Policies (SCPs) in AWS Organizations.
SCPs can be attached at the Organization root, OUs (e.g., separate policies or one policy for dev + prod), or specific accounts. They deny Create/Modify actions (e.g., rds:CreateDBInstance, dynamodb:CreateTable, dynamodb:TagResource, etc.) if the required tags are missing or have invalid values.
Example SCP structure (high-level):
StringNotEquals or Null checks on aws:RequestTag/cost-center and aws:RequestTag/project-id (or use tag policies for more advanced enforcement).Because the company already mandates CloudFormation for all infrastructure, SCPs work seamlessly—CloudFormation passes tags at creation time, and non-compliant stacks will simply fail. This provides preventive governance without relying on reactive fixes.
This approach gives immediate tagging for historical/existing resources + ongoing enforcement across the multi-account Organization, directly supporting billing transparency and cost management.
Option A:
Uses Tag Editor + cost allocation tags (good for existing resources and billing visibility).
Missing: Any enforcement mechanism for future resources. New tables/instances could still be created without the tags, violating the management requirement for "all current and future" resources. Not a complete strategy.
Option B:
Relies on AWS Config (to detect untagged resources) + a centralized Lambda that runs every hour with cross-account roles to retroactively tag.
This is reactive and operational overhead-heavy (hourly runs, custom Lambda code for RDS + DynamoDB, handling permissions, potential race conditions). It does not prevent creation of untagged resources upfront. AWS recommends preventive controls (like SCPs) over detective + corrective ones when possible, especially with CloudFormation already in use.
Option D:
Activates cost allocation tags (good) and tries to enforce via modifying federated roles (IAM policies with tag conditions, e.g., aws:RequestTag).
Problems:
cfn-guard or StackSets with enforced parameters, but SCPs provide the strongest guardrail.required-tags rule (supports RDS and DynamoDB) as a detective control on top of prevention.This strategy aligns with AWS Well-Architected Framework recommendations for Cost Optimization and Governance in multi-account environments using Organizations.
Ultimate access to all questions.
No comments yet.
A large company has faced an unexpected surge in costs for Amazon RDS and Amazon DynamoDB services. To enhance cost management and billing transparency across multiple AWS accounts within AWS Organizations, including both development and production environments, the company seeks a strategic approach. Despite the absence of a unified tagging policy, the company mandates the use of AWS CloudFormation for infrastructure deployment with consistent tagging practices. The management team insists on the inclusion of cost center numbers and project ID numbers for all current and future DynamoDB tables and RDS instances. What strategy should the solutions architect propose to fulfill these management requirements effectively?
A
Utilize Tag Editor to apply tags to existing resources. Establish cost allocation tags to specify the cost center and project ID, allowing 24 hours for these tags to be reflected in the billing data.
B
Implement an AWS Config rule to notify the finance department of resources without tags. Develop a centralized AWS Lambda solution that uses a cross-account role to periodically tag untagged RDS databases and DynamoDB resources every hour.
C
Employ Tag Editor to tag existing resources. Set up cost allocation tags to identify the cost center and project ID. Enforce Service Control Policies (SCPs) to prevent the creation of resources that lack the required cost center and project ID tags.
D
Define cost allocation tags for the cost center and project ID, allowing 24 hours for these tags to update in the billing data. Modify existing federated roles to limit the ability to provision resources that do not adhere to the tagging requirements for cost center and project ID.