Which of the following strategies can be used to control access to your Amazon EC2 instances?

Which of the following strategies can be used to control access to your Amazon EC2 instances?
A .  DB security groups
B .  IAM policies
C .  None of these
D .  EC2 security groups

Answer: D

Explanation:

IAM policies allow you to specify what actions your IAM users are allowed to perform against your EC2

Instances.

However, when it comes to access control, security groups are what you need in order to define and control the way you want your instances to be accessed, and whether or not certain kind of communications are allowed or not.

Reference: http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/UsingIAM.html

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments