Q: 1
CloudFormation stack deployments fail for some users due to permission inconsistencies.
Which combination of steps will ensure consistent deployments MOST securely? (Select THREE.)
Options
Discussion
B C, E is right. You want to create the CloudFormation service role (B), scope its permissions (C), and then set it on each stack (E). That way, users’ own perms don’t matter for deployments. Pretty sure this lines up with AWS best practices.
Option D
It’s B, C, E. I don’t think F is needed here-PassRole is mainly for letting users pass roles at deploy time, but with a dedicated service role set on the stack (E), CloudFormation does the work using its own permissions. The trap is thinking user permissions fix this, but scoped service roles are way more secure and reliable. Someone correct me if I’m missing something about D.
I get that some people might consider F for iam:PassRole, but that's more about letting users pass roles, not securing consistent stack deployments. Setting the service role on the stack itself (E) lets CloudFormation use only what it needs. Does anyone think A would make sense here?
Be respectful. No spam.