Search⌘ K
AI Features

Security I

Explore secure AWS development practices including managing programmatic access for developers, implementing user authentication with Amazon Cognito, resolving permission issues for S3 with KMS encryption, securely storing database credentials using AWS Secrets Manager, and authorizing EC2 instances to publish custom CloudWatch metrics without embedding credentials.

Question 22

A software development team is building a new application interacting with various AWS services (e.g., Amazon S3, DynamoDB). While the production and staging environments are deployed on Amazon EC2 instances, each developer needs to run and test a local instance of the application on their personal laptop to connect directly to their AWS development environment.

Considering security, auditability, and ease of management for individual developers, what is the most appropriate and secure method for providing these developers programmatic access to AWS services from their local machines?

A. Configure a single IAM role that all developers assume for local development access.

B. Create a shared IAM user with a single set of access keys for the entire development team.

C. Issue a unique IAM user with its own access key and secret access key to each individual developer. ...