An enterprise wants to use a third-party SaaS application. The SaaS application needs to have access to issue several API commands to discover Amazon EC2 resources running within the enterprise's account The enterprise has internal security policies that require any outside access to their environment must conform to the principles of least privilege and there must be controls in place to ensure that the credentials used by the SaaS vendor cannot be used by any other third party.
Which of the following would meet all of these conditions?
amog
Highly Voted 3 years, 9 months agostudent22
Most Recent 7 months, 3 weeks agoamministrazione
10 months, 2 weeks agokondratyevmn
1 year, 11 months agojack_melvin
1 year, 11 months agomnsait
7 months, 2 weeks agohollie
2 years, 6 months agodavideccc
2 years, 8 months agoKengL
3 years agobobsmith2000
3 years, 2 months agobobsmith2000
3 years agodavideccc
2 years, 8 months agoacloudguru
3 years, 7 months agokashi1983
3 years, 7 months agoAkhil254
3 years, 8 months ago01037
3 years, 8 months agoBulti
3 years, 8 months agoRyanGhavidel
3 years, 8 months agoguptas
3 years, 8 months agofullaws
3 years, 8 months agonoisonnoiton
3 years, 8 months ago