A company has a batch-processing system that uses Amazon S3, Amazon EC2, and AWS Key Management Service (AWS KMS). The system uses two AWS accounts: Account A and Account B.
Account A hosts an S3 bucket that stores the objects that will be processed. The S3 bucket also stores the results of the processing. All the S3 bucket objects are encrypted by a KMS key that is managed in Account A.
Account B hosts a VPC that has a fleet of EC2 instances that access the S3 bucket in Account A by using statements in the bucket policy. The VPC was created with DNS hostnames enabled and DNS resolution enabled.
A security engineer needs to update the design of the system without changing any of the system's code. No AWS API calls from the batch-processing EC2 instances can travel over the internet.
Which combination of steps will meet these requirements? (Choose two.)
komik_101
2 weeks, 1 day ago3e88bd8
3 weeks agodiv05jkjl
3 weeks, 6 days agoVPNalumni
1 month agomikelord
1 month, 1 week agomikelord
1 month, 1 week ago