A. Grant the developer access to only the AWS resources needed to perform the job: Following the principle of least privilege, it is advisable to provide the developer with access only to the specific AWS resources necessary for their job role. This minimizes the potential impact of security incidents and limits the scope of actions the developer can perform.
E. Ensure the account password policy requires a minimum length: Implementing a password policy that requires a minimum length is a good security practice. It helps enhance the strength of passwords and contributes to better overall account security. Longer passwords are generally more resistant to brute-force attacks.
A. Grant the developer access to only the AWS resources needed to perform the job: Following the principle of least privilege, it is advisable to provide the developer with access only to the specific AWS resources necessary for their job role. This minimizes the potential impact of security incidents and limits the scope of actions the developer can perform.
E. Ensure the account password policy requires a minimum length: Implementing a password policy that requires a minimum length is a good security practice. It helps enhance the strength of passwords and contributes to better overall account security. Longer passwords are generally more resistant to brute-force attacks.
Options B and C and D are not recommended
A. Grant the developer access to only the AWS resources needed to perform the job: Following the principle of least privilege, it is advisable to provide the developer with access only to the specific AWS resources necessary for their job role. This minimizes the potential impact of security incidents and limits the scope of actions the developer can perform.
E. Ensure the account password policy requires a minimum length: Implementing a password policy that requires a minimum length is a good security practice. It helps enhance the strength of passwords and contributes to better overall account security. Longer passwords are generally more resistant to brute-force attacks.
Options B and C and D are not recommended
No root account required for development.
No admin required for AWS.
An employee should regularly (depending on corporate policy) change the password.
E seems correct, because one shouldn't use easy passwords.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Amin_013
5 months, 4 weeks agoRuffyit
11 months agoTheFivePips
11 months, 1 week agostheno
1 year agoABA2021
1 year, 1 month agoTheRealTrompie99
1 year, 1 month agoEssentialD
1 year, 1 month agopeable
1 year, 1 month agoasdfcdsxdfc
1 year, 1 month agodemo4422
1 year, 1 month agorankocertified
1 year, 1 month agoaragon_saa
1 year, 2 months agoTIENPV
1 year, 2 months ago