A company allows its developers to attach existing IAM policies to existing IAM roles to enable faster experimentation and agility. However, the security operations team is concerned that the developers could attach the existing administrator policy, which would allow the developers to circumvent any other security policies.
How should a solutions architect address this issue?
foreverlearner
Highly Voted 3 years, 7 months agosumitchhabra
Highly Voted 3 years, 7 months agoSachin032
Most Recent 2 years, 3 months agoqueen101
2 years, 9 months agomarklovesaws143
2 years, 9 months agobuna6750
2 years, 10 months agoslcheng
2 years, 10 months agoslcheng
2 years, 10 months agoUkosas
3 years agosaifeddine92
3 years, 2 months ago[Removed]
3 years, 5 months agoVijay1986
3 years, 5 months agoRagnarLodbrok
3 years, 6 months agoVibes
3 years, 6 months agowoke
3 years, 6 months agoAbdullah777
3 years, 6 months agosyu31svc
3 years, 6 months ago