A company uses AWS Organizations with all features enabled and runs multiple Amazon EC2 workloads in the ap-southeast-2 Region. The company has a service control policy (SCP) that prevents any resources from being created in any other Region. A security policy requires the company to encrypt all data at rest.
An audit discovers that employees have created Amazon Elastic Block Store (Amazon EBS) volumes for EC2 instances without encrypting the volumes. The company wants any new EC2 instances that any IAM user or root user launches in ap-southeast-2 to use encrypted EBS volumes. The company wants a solution that will have minimal effect on employees who create EBS volumes.
Which combination of steps will meet these requirements? (Choose two.)
Guru4Cloud
Highly Voted 1 year, 4 months agoAxaus
Highly Voted 1 year, 7 months agonetwork_enthusiast
Most Recent 2 months, 2 weeks agoAndreew883
2 months, 3 weeks agoJazz888
7 months agoNSA_Poker
7 months, 1 week agovenutadi
8 months, 2 weeks ago1rob
1 year agopentium75
1 year agodkw2342
10 months agoValder21
1 year, 4 months agobjexamprep
1 year, 4 months agonovelai_me
1 year, 6 months agoBuruguduystunstugudunstuy
1 year, 6 months agoPRASAD180
1 year, 7 months agohiroohiroo
1 year, 7 months agoEfren
1 year, 7 months agonosense
1 year, 7 months agopentium75
1 year agoEfren
1 year, 7 months ago