Developers are using IAM access keys to manage flaws resources using flaws CLI. Company policy requires that access keys are automatically disabled when the access key age is greater than 90 days. Which solution will accomplish this?

QuestionsCategory: SOA-C01Developers are using IAM access keys to manage flaws resources using flaws CLI. Company policy requires that access keys are automatically disabled when the access key age is greater than 90 days. Which solution will accomplish this?
Admin Staff asked 3 months ago
Developers are using IAM access keys to manage flaws resources using flaws CLI. Company policy requires that access keys are automatically disabled when the access key age is greater than 90 days.
Which solution will accomplish this?
A. Configure an Amazon CloudWatch alarm to trigger an flaws Lambda function that disables keys older than 90 days. B. Configure flaws Trusted Advisor to identify and disable keys older than 90 days. C. Set a password policy on the account with a 90-day expiration. D. Use an flaws Config rule to identify noncompliant keys. Create a custom flaws Systems Manager Automation document for remediation. Correct Answer: D This question is in SOA-C01 AWS Certified SysOps Administrator – Associate Exam For getting AWS Certified SysOps Administrator – Associate Certificate

Disclaimers:
The website is not related to, affiliated with, endorsed or authorized by Amazon.
Trademarks, certification & product names are used for reference only and belong to Amazon.
The website does not contain actual questions and answers from Amazon's Certification Exam.
Question Tags:

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.