A company uses AWS Organizations with all features enabled and runs multiple Amazon EC2 workloads in the ap-southeast-2 Region. The company has a service control policy (SCP) that prevents any resources from being created in any other Region. A security policy requires the company to encrypt all data at rest.
An audit discovers that employees have created Amazon Elastic Block Store (Amazon EBS) volumes for EC2 instances without encrypting the volumes. The company wants any new EC2 instances that any IAM user or root user launches in ap-southeast-2 to use encrypted EBS volumes. The company wants a solution that will have minimal effect on employees who create EBS volumes.
Which combination of steps will meet these requirements? (Choose two.)
Guru4Cloud
Highly Voted 1 year, 2 months agoAxaus
Highly Voted 1 year, 6 months agoJazz888
Most Recent 5 months, 2 weeks agoNSA_Poker
5 months, 3 weeks agovenutadi
6 months, 4 weeks ago1rob
10 months, 2 weeks agopentium75
10 months, 3 weeks agodkw2342
8 months, 2 weeks agoValder21
1 year, 2 months agobjexamprep
1 year, 2 months agonovelai_me
1 year, 4 months agoBuruguduystunstugudunstuy
1 year, 5 months agoPRASAD180
1 year, 5 months ago[Removed]
1 year, 6 months agohiroohiroo
1 year, 6 months agoEfren
1 year, 6 months agonosense
1 year, 6 months agoEfren
1 year, 6 months agopentium75
10 months, 3 weeks ago