
Ultimate access to all questions.
Deep dive into the quiz with AI chat providers.
We prepare a focused prompt with your quiz and certificate details so each AI can offer a more tailored, in-depth explanation.
A company has many developers who need programmatic access to AWS services. The company must provide the access in compliance with AWS security best practices.
Which solution will meet these requirements?
A
Require multi-factor authentication (MFA) for the AWS account root user and all IAM users. Rotate access keys.
B
Create a single shared IAM user account for all the developers.
C
Use the AWS account root user for programmatic access. Rotate access keys.
D
Create IAM permissions boundaries. Require multi-factor authentication (MFA) for the AWS account root user.
Explanation:
Option A is the correct answer because it follows AWS security best practices:
MFA for root user and all IAM users: The root user has unrestricted access to all AWS services and resources, so MFA is critical. For IAM users, MFA adds an extra layer of security beyond just username and password.
Rotate access keys: Regularly rotating access keys reduces the risk if keys are accidentally exposed or compromised.
Why other options are incorrect:
Option B: Creating a single shared IAM user account violates the principle of least privilege and makes auditing difficult. Each developer should have their own IAM user with appropriate permissions.
Option C: Using the root user for programmatic access is strongly discouraged by AWS. The root user should only be used for account management tasks, not for daily operations or programmatic access.
Option D: While MFA for the root user is good, this option doesn't address the need for individual developer accounts or access key rotation. IAM permissions boundaries alone are not sufficient for comprehensive security.
AWS Security Best Practices:
Use individual IAM users instead of shared accounts
Enable MFA for all users
Rotate access keys regularly
Use the root user only for essential account management tasks
Follow the principle of least privilege