Prev Question
Next Question

A company is building software on AWS that requires access to various AWS services. Which configuration
should be used to ensure mat AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not
compromised?

A.
Enable Multi-Factor Authentication for your AWS root account.

B.
Assign an IAM role to the Amazon EC2 instance.

C.
Store the AWS Access Key ID/Secret Access Key combination in software comments.

D.
Assign an IAM user to the Amazon EC2 Instance.

Explanation:
Use roles for applications that run on Amazon EC2 instances.
Applications that run on an Amazon EC2 instance need credentials in order to access other AWS services. To
provide credentials to the application in a secure way, use IAM roles. A role is an entity that has its own set of
permissions, but that isn’t a user or group. Roles also don’t have their own permanent set of credentials the way
IAM users do. In the case of Amazon EC2, IAM dynamically provides temporary credentials to the EC2
instance, and these credentials are automatically rotated for you.
http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#use-roles-with-ec2

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *