Q: 15
A company has an application that runs on an Amazon Elastic Kubernetes Service (Amazon EKS)
cluster on Amazon EC2 instances. The application has a U1 that uses Amazon DynamoDB and data
services that use Amazon S3 as part of the application deployment.
The company must ensure that the EKS Pods for the U1 can access only Amazon DynamoDB and that
the EKS Pods for the data services can access only Amazon S3. The company uses AWS Identity and
Access Management |IAM).
Which solution meets these requirements?
Options
Discussion
Option C matches what I've seen in similar exam reports. You need to use IRSA with different Kubernetes service accounts so each type of pod only gets permissions for its AWS resource. That's the best way to enforce least privilege here. Tiny nit, but make sure you attach the right policy to the right k8s service account. Pretty sure C is safest, but open if someone disagrees.
C . IRSA plus separate k8s service accounts is the standard way for pod-level access control to AWS services so each only gets what it needs.
C. This matches what the official AWS guides and exam practice sets focus on, using IRSA with service accounts to restrict pod access individually.
B , C is right because D actually gets the permissions mixed up (tricky wording). Seen similar on other practice sets.
C tbh
C imo. Option D mixes up which pod gets which access, so it's a bit of a trap. IRSA with separate service accounts and matching policies is the proper way for least privilege at the pod level.
Be respectful. No spam.
Question 15 of 35