Q: 1
CloudFormation stack deployments fail for some users due to permission inconsistencies.
Which combination of steps will ensure consistent deployments MOST securely? (Select THREE.)
Options
Discussion
Option B C and E for sure. Setting up the service role (B), scoping its permissions (C), then updating the stack (E) means CloudFormation always runs with the right access, not whatever random rights users have. PassRole (F) is user-side, but here we're standardizing deployment access. Pretty sure that's most secure-let me know if you see it differently.
C E, F maybe? I picked F because I remember seeing a similar question where iam:PassRole was needed to let users assign the service role during stack setup. C and E line up with scoping and configuring the role, but I'm less sure about skipping B. Could be missing something with trust relationships here.
B, C, E tbh. Composite principal (A) only if cross-account or services, but this question’s scope is just single service role setup.
B. C, E here. D is tempting but that's more about resource-level restrictions, and F applies if users are letting the stack assume a role at deploy time. Pretty sure B, C, E is what AWS recommends for secure and consistent CloudFormation permissions. Agree?
B C, E is right. You want to create the CloudFormation service role (B), scope its permissions (C), and then set it on each stack (E). That way, users’ own perms don’t matter for deployments. Pretty sure this lines up with AWS best practices.
Option D
Maybe C, D, F on this one.
Its D. D looks right since attaching service ARNs in policy resources can lock down permissions to specific resources and that’s what makes it secure. B is a trap, I think, because creating a service role alone won’t solve the inconsistency for all users. If anyone disagrees, let me know.
B. C, E imo. Creating the service role for CloudFormation (B) and scoping its permissions (C) keeps it secure and avoids users needing extra privileges. Updating stacks to use this role (E) makes the process consistent for everyone. Pretty sure that's the most secure combo unless there's a multi-account twist.
I think B, C and E are the best picks. Service role with cloudformation.amazonaws.com (B) is required, then scope permissions (C), and finally update the stack to use the role (E). F looks tempting, but PassRole is more about who can assign the role, not consistent stack execution. Disagree?
Be respectful. No spam.