A company runs an infrastructure monitoring service. The company is building a new feature that will enable the service to monitor data in customer AWS accounts. The new feature will call AWS APIs in customer accounts to describe Amazon EC2 instances and read Amazon CloudWatch metrics.
What should the company do to obtain access to customer accounts in the MOST secure way?
cloudenthusiast
Highly Voted 1 year, 4 months agoPiccalo
Highly Voted 1 year, 4 months agoEfren
1 year, 4 months agoawsgeek75
Most Recent 8 months, 2 weeks agopentium75
9 months ago1rob
10 months agoawsgeek75
8 months, 3 weeks agopentium75
9 months ago1rob
8 months, 3 weeks agoGuru4Cloud
1 year, 1 month ago