An IT team has built an AWS CloudFormation template so others in the company can quickly and reliably deploy and terminate an application. The template creates an Amazon EC2 instance with a user data script to install the application and an Amazon S3 bucket that the application uses to serve static webpages while it is running.
All resources should be removed when the CloudFormation stack is deleted. However, the team observes that CloudFormation reports an error during stack deletion, and the S3 bucket created by the stack is not deleted.
How can the team resolve the error in the MOST efficient manner to ensure that all resources are deleted without errors?
You need to understand how SCP inheritance works in AWS. The way it works for Deny policies is different that allow policies.
Allow polices are passing down to children ONLY if they don't have an allow policy.
Deny policies always pass down to children.
That's why there is always an SCP set to the Root to allow everything by default. If you limit this policy, the whole organization will be limited, not matter what other policies are saying for the other OUs. So it's not A. It's not D because it restricts the wrong OU.
Mozell
5 months agoAlisha
5 months agoLenny
5 months agoFrancene
5 months agoDulce
6 months agoDion
6 months agoJanine
6 months agoMerlyn
6 months agoGalen
6 months agoBernadine
6 months agoDomingo
6 months agoAngella
6 months agoColeen
6 months agoJeannetta
7 months agoJohnson
7 months agoTrina
7 months agoDarrel
11 months agoTracie
11 months agoShaun
11 months agoKeshia
11 months agoAileen
10 months agoMyra
10 months agoTuyet
10 months agoQuentin
11 months agoAhmed
11 months agoNidia
11 months agoDerrick
1 year agoTyra
11 months agoTimothy
11 months agoColette
12 months agoSarina
12 months agoAdell
1 year agoHui
1 year agoAdell
1 year ago