A company is building software on AWS that requires access to various AWS services. Which configuration should be used to ensure that AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not compromised?

Q & ACategory: QuestionsA company is building software on AWS that requires access to various AWS services. Which configuration should be used to ensure that AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not compromised?
Admin Staff asked 5 years ago

A company is building software on AWS that requires access to various AWS services. Which configuration should be used to ensure that AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not compromised?

A) Enable Multi-Factor Authentication for your AWS root account.

B) Assign an IAM role to the Amazon EC2 instance

C) Store the AWS Access Key ID/Secret Access Key combination in software comments.

D) Assign an IAM user to the Amazon EC2 Instance.

1 Answers
Admin Staff answered 5 years ago

A) Enable Multi-Factor Authentication for your AWS root account.