A company uses AWS Organizations with all features enabled and runs multiple Amazon EC2 workloads in the ap-southeast-2 Region. The company has a service control policy (SCP) that prevents any resources from being created in any other Region. A security policy requires the company to encrypt all data at rest.
An audit discovers that employees have created Amazon Elastic Block Store (Amazon EBS) volumes for EC2 instances without encrypting the volumes. The company wants any new EC2 instances that any IAM user or root user launches in ap-southeast-2 to use encrypted EBS volumes. The company wants a solution that will have minimal effect on employees who create EBS volumes.
Which combination of steps will meet these requirements? (Choose two.)
Guru4Cloud
Highly Voted 1 year, 4 months agoAxaus
Highly Voted 1 year, 7 months agonetwork_enthusiast
Most Recent 2 months, 1 week agoAndreew883
2 months, 2 weeks agoJazz888
6 months, 3 weeks agoNSA_Poker
7 months agovenutadi
8 months ago1rob
11 months, 3 weeks agopentium75
12 months agodkw2342
9 months, 3 weeks agoValder21
1 year, 3 months agobjexamprep
1 year, 3 months agonovelai_me
1 year, 6 months agoBuruguduystunstugudunstuy
1 year, 6 months agoPRASAD180
1 year, 7 months ago[Removed]
1 year, 7 months agohiroohiroo
1 year, 7 months agoEfren
1 year, 7 months ago