AWS Certified Solutions Architect Associate SAA-C03 Practice Question
Your client is managing a global application that serves various independent stakeholders, requiring strict data segregation. To maintain a robust security posture, what method should they implement to ensure each stakeholder can access only their designated information while adhering to best practices for secure architecture design?
You selected this option
Create dedicated roles for each stakeholder with tailored policies enforcing exclusive access to their own sets of resources.
You selected this option
Implement broad policies that manage the access rights of stakeholders at the organizational level.
You selected this option
Federate an on-premises directory with roles to manage stakeholder access within the platform's environment.
You selected this option
Organize stakeholders into groups and manage their permissions collectively based on established group roles.
Creating individual roles with precise permissions tailored for each stakeholder equips them with exclusive access to their information, championing the principle of least privilege. This technique is key in preventing inter-stakeholder access and is congruent with established guidelines for safeguarding cloud resources. Arranging stakeholders into groups does not offer the required detail for segregation within a multi-tenant model and service control policies are more fitting for broad organizational constraints rather than fine-grained resource distinction. While integrating a directory with role-based access is a viable security measure, it does not inherently address the segregation of stakeholder data at the architecture level.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of least privilege?
Open an interactive chat with Bash
What are tailored policies in AWS and how do they enforce access?
Open an interactive chat with Bash
How does AWS handle multi-tenancy in terms of security?