An IT team has built an AWS CloudFormation template so others in the company can quickly and reliably deploy and terminate an application. The template creates an Amazon EC2 instance with a user data script to install the application and an Amazon S3 bucket that the application uses to serve static webpages while it is running.
All resources should be removed when the CloudFormation stack is deleted. However, the team observes that CloudFormation reports an error during stack deletion, and the S3 bucket created by the stack is not deleted.
How can the team resolve the error in the MOST efficient manner to ensure that all resources are deleted without errors?
You need to understand how SCP inheritance works in AWS. The way it works for Deny policies is different that allow policies.
Allow polices are passing down to children ONLY if they don't have an allow policy.
Deny policies always pass down to children.
That's why there is always an SCP set to the Root to allow everything by default. If you limit this policy, the whole organization will be limited, not matter what other policies are saying for the other OUs. So it's not A. It's not D because it restricts the wrong OU.
Mozell
3 months agoAlisha
3 months agoLenny
3 months agoFrancene
4 months agoDulce
4 months agoDion
4 months agoJanine
4 months agoMerlyn
4 months agoGalen
5 months agoBernadine
5 months agoDomingo
5 months agoAngella
5 months agoColeen
5 months agoJeannetta
5 months agoJohnson
5 months agoTrina
5 months agoDarrel
9 months agoTracie
9 months agoShaun
9 months agoKeshia
10 months agoAileen
8 months agoMyra
8 months agoTuyet
9 months agoQuentin
9 months agoAhmed
9 months agoNidia
9 months agoDerrick
10 months agoTyra
9 months agoTimothy
10 months agoColette
10 months agoSarina
10 months agoAdell
10 months agoHui
10 months agoAdell
11 months ago