A company uses AWS Organizations with all features enabled and runs multiple Amazon EC2 workloads in the ap-southeast-2 Region. The company has a service control policy (SCP) that prevents any resources from being created in any other Region. A security policy requires the company to encrypt all data at rest.
An audit discovers that employees have created Amazon Elastic Block Store (Amazon EBS) volumes for EC2 instances without encrypting the volumes. The company wants any new EC2 instances that any IAM user or root user launches in ap-southeast-2 to use encrypted EBS volumes. The company wants a solution that will have minimal effect on employees who create EBS volumes.
Which combination of steps will meet these requirements? (Choose two.)
Guru4Cloud
Highly Voted 10 months, 3 weeks agoAxaus
Highly Voted 1 year, 1 month agoJazz888
Most Recent 1 month, 1 week agoNSA_Poker
1 month, 2 weeks agovenutadi
2 months, 2 weeks ago1rob
6 months, 1 week agopentium75
6 months, 2 weeks agodkw2342
4 months, 1 week agoValder21
10 months, 1 week agobjexamprep
10 months, 2 weeks agonovelai_me
1 year agoBuruguduystunstugudunstuy
1 year, 1 month agoPRASAD180
1 year, 1 month ago[Removed]
1 year, 1 month agohiroohiroo
1 year, 1 month agoEfren
1 year, 1 month agonosense
1 year, 2 months agopentium75
6 months, 2 weeks agoEfren
1 year, 1 month ago