CLOUD COMPUTING

CLOUD COMPUTING

IDENTITY ACCESS MANAGEMENT

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An employee with access to the root user on your AWS account has just left your company. Since you can’t be 100 percent sure that the former employee won’t try to harm your company, which of the following steps should you take? (Choose two)
A
Change the password and MFA settings for the root account​
B
Delete and re-create all existing IAM policies​
C
Change he passwords for all your IAM users​
D
Delete the former employee’s own IAM user (within the company account)​
Explanation: 

Detailed explanation-1: -It would make it difficult to track which account user is responsible for specific actions. Since root has full permissions over your account resources, an account compromise at the hands of hackers would be catastrophic.

Detailed explanation-2: -To get started using IAM to manage permissions for AWS services and resources, create an IAM role and grant it permissions. For workforce users, create a role that can be assumed by your identity provider. For systems, create a role that can be assumed by the service you are using, such as Amazon EC2 or AWS Lambda.

Detailed explanation-3: -You can allow users from one AWS account to access resources in another AWS account. To do this, create a role that defines who can access it and what permissions it grants to users that switch to it.

Detailed explanation-4: -Federated users don’t have permanent identities in your AWS account the way that IAM users do. To assign permissions to federated users, you can create an entity referred to as a role and define permissions for the role.

There is 1 question to complete.