AWS Certified Solutions Architect Associate SAA-C03 Practice Question
An organization manages 3 accounts: Dev, Test, and Prod, all are centrally controlled. The development team needs to interact with resources in the Test account to perform integration tests. According to AWS best practices, what is the most secure and efficient method to grant the development team access to the resources in the Testing account?
You selected this option
Create IAM user in the Test account for each developer and share the credentials with them.
You selected this option
Implement a single sign-on solution to allow the development team to access the Test account using their existing credentials.
You selected this option
Configure a role in the Test account with necessary permissions and allow the development team to assume this role from the Dev account.
You selected this option
Apply resource-based policies on the resources in the Test account to grant access to the development team.
Setting up a role in the Test account and allowing the development team to assume this role from the Dev account is the recommended approach. This method uses temporary security credentials, providing secure and efficient access without sharing long-term credentials. It adheres to the principle of least privilege by granting only the necessary permissions for the task. Creating IAM users in the Test account and sharing credentials poses security challenges due to the burden associated with managing static credentials. Implementing a single sign-on solution might introduce unnecessary complexity for this specific scenario. Applying resource-based policies on individual resources is less scalable and harder to manage compared to using roles for cross-account access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are IAM roles and how do they work?
Open an interactive chat with Bash
What is the principle of least privilege?
Open an interactive chat with Bash
Why is sharing IAM user credentials considered a security risk?