COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Permissions boundaries – Use a managed policy as the permissions boundary for an IAM entity (user or role). That policy defines the maximum permissions that the identity-based policies can grant to an entity, but does not grant permissions.
Detailed explanation-2: -Apply least-privilege permissions When you set permissions with IAM policies, grant only the specific permissions required to perform specific tasks, also known as least-privilege permissions.
Detailed explanation-3: -Access can be granted by either an identity-based policy or a resource-based policy when access is within the same AWS account.
Detailed explanation-4: -The answer is (B). A policy is a permission that allows users, specifically IAM identities (users, groups of users, or roles), to do something with the AWS resources.