
Ultimate access to all questions.
A company has multiple AWS accounts within an organization in AWS Organizations. They have deployed Amazon VPC IP Address Manager (IPAM) in their networking AWS account and are using AWS Resource Access Manager (AWS RAM) to share IPAM pools with other accounts. A top-level IPAM pool with a CIDR block of 10.0.0.0/8 has been created, and each AWS account has its own IPAM pool within this top-level pool.
A network engineer must implement a solution to ensure that users in each AWS account are unable to create new VPCs and cannot associate CIDR blocks with existing VPCs unless the CIDR block is from the account's assigned IPAM pool.
What solution will meet these requirements?
A
Create a new AWS Config rule to find all VPCs that are not configured to allocate their CIDR block from an IPAM pool. Invoke an AWS Lambda function to delete these VPCs.
B
Create a new SCP in Organizations. Add a condition that denies the CreateVpc and AssociateVpcCidrBlock Amazon EC2 actions if the Ipv4IpamPoolId context key value is not the ID of an IPAM pool.
C
Create an AWS Lambda function to check for and delete all VPCs that are not configured to allocate their CIDR block from an IPAM pool. Invoke the Lambda function at regular intervals.
D
Create an Amazon EventBridge rule to check for AWS CloudTrail events for the CreateVpc and AssociateVpcCidrBlock Amazon EC2 actions. Use the rule to invoke an AWS Lambda function to delete all VPCs that are not configured to allocate their CIDR block from an IPAM pool.