
Ultimate access to all questions.
A financial services company, which manages an asset management product used by thousands of customers globally, collects feedback through surveys. The company is developing a new analytical solution on Amazon EMR to analyze this survey data. Various user roles need access to this solution for specific tasks: • The Administrator is responsible for setting up the EMR cluster according to the analytics team's needs. • The Data Engineer executes ETL scripts to process and enrich the datasets. • The Data Analyst performs SQL and Hive queries on the data. A solutions architect is tasked with ensuring that each user role has the minimum necessary access to the required resources, can only launch authorized applications, and that all created resources are properly tagged. Which solution meets these requirements?
A
Create IAM roles for each user persona. Attach identity-based policies to define which actions the user who assumes the role can perform. Create an AWS Config rule to check for noncompliant resources. Configure the rule to notify the administrator to remediate the noncompliant resources.
B
Setup Kerberos-based authentication for EMR clusters upon launch. Specify a Kerberos security configuration along with cluster-specific Kerberos options.
C
Use AWS Service Catalog to control the Amazon EMR versions available for deployment, the cluster configuration, and the permissions for each user persona.
D
Launch the EMR cluster by using AWS CloudFormation, Attach resource-based policies to the EMR cluster during cluster creation. Create an AWS. Config rule to check for noncompliant clusters and noncompliant Amazon S3 buckets. Configure the rule to notify the administrator to remediate the noncompliant resources.