FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A good policy blocks users from ALL areas-except those that they need to do their job.
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Permissions boundaries – Use a managed policy as the permissions boundary for an IAM entity (user or role). That policy defines the maximum permissions that the identity-based policies can grant to an entity, but does not grant permissions.

Detailed explanation-2: -Apply least-privilege permissions When you set permissions with IAM policies, grant only the specific permissions required to perform specific tasks, also known as least-privilege permissions.

Detailed explanation-3: -Access can be granted by either an identity-based policy or a resource-based policy when access is within the same AWS account.

Detailed explanation-4: -The answer is (B). A policy is a permission that allows users, specifically IAM identities (users, groups of users, or roles), to do something with the AWS resources.

There is 1 question to complete.