A company runs an infrastructure monitoring service. The company is building a new feature that will enable the service to monitor data in customer AWS accounts. The new feature will call AWS APIs in customer accounts to describe Amazon EC2 instances and read Amazon CloudWatch metrics.
What should the company do to obtain access to customer accounts in the MOST secure way?
cloudenthusiast
Highly Voted 1 year, 6 months agoPiccalo
Highly Voted 1 year, 6 months agoEfren
1 year, 6 months agoawsgeek75
Most Recent 10 months agopentium75
10 months, 3 weeks ago1rob
11 months, 3 weeks agopentium75
10 months, 3 weeks ago1rob
10 months, 2 weeks agoawsgeek75
10 months, 2 weeks agoGuru4Cloud
1 year, 3 months ago