An enterprise wants to use a third-party SaaS application. The SaaS application needs to have access to issue several API commands to discover Amazon EC2 resources running within the enterprise's account The enterprise has internal security policies that require any outside access to their environment must conform to the principles of least privilege and there must be controls in place to ensure that the credentials used by the SaaS vendor cannot be used by any other third party.
Which of the following would meet all of these conditions?
amog
Highly Voted 3 years, 7 months agostudent22
Most Recent 6 months agoamministrazione
8 months, 3 weeks agokondratyevmn
1 year, 9 months agojack_melvin
1 year, 9 months agomnsait
5 months, 3 weeks agohollie
2 years, 4 months agodavideccc
2 years, 7 months agoKengL
2 years, 11 months agobobsmith2000
3 years agobobsmith2000
2 years, 11 months agodavideccc
2 years, 7 months agoacloudguru
3 years, 5 months agokashi1983
3 years, 6 months agoAkhil254
3 years, 6 months ago01037
3 years, 6 months agoBulti
3 years, 6 months agoRyanGhavidel
3 years, 6 months agoguptas
3 years, 6 months agofullaws
3 years, 6 months agonoisonnoiton
3 years, 7 months ago