Secure Architecture IV
Explore AWS best practices for designing secure and resilient architectures. Learn how to configure resource sharing, automate security assessments, manage private connectivity, and ensure compliance using AWS services. This lesson helps you understand practical solutions for protecting applications, monitoring security, and optimizing access control across multiple AWS accounts.
We'll cover the following...
Question 29
A company’s application performs financial transactions using a third-party API. The application consists of multiple EC2 instances in an Auto Scaling group behind an Application Load Balancer. Application data is stored on the S3 bucket. The company must share the data with the partnered company for research purposes. The partnered company has a different AWS account that requires access to the S3 bucket.
As a solutions architect, provide a solution to meet these requirements.
A. Configure AWS Macie to securely share AWS resources, such as S3 bucket.
B. Configure AWS Audit Manager to securely share AWS resources, such as S3 bucket.
C. Configure AWS Resource Access Manager to securely share AWS resources, such as S3 bucket.
D. Configure Amazon Detective to securely share AWS resources, such as S3 bucket.
Question 30
A company has multiple applications on the AWS Cloud. The applications are integrated with ...