I get that some people might consider F for iam:PassRole, but that's more about letting users pass roles, not securing consistent stack deployments. Setting the service role on the stack itself (E) lets CloudFormation use only what it needs. Does anyone think A would make sense here?
Option A works because Macie is built for S3 data discovery and lets you handle multiple accounts from a central security account. Quick check though, did the question specify if all S3 buckets are in the same org? That would impact the setup.
Had something like this in a mock, pretty sure C is right. You want to save the EBS volumes by disabling delete on termination, then kill the compromised box so nothing else leaks. Forensics should always happen offline on a new host for clean analysis. Makes sense?
Option A fits since GuardDuty handles detection automatically and scales across accounts with Organizations. If you want detection, Inspector or Athena won’t do it for you. Only caveat: if you need detailed custom rules, you might have to layer other solutions, but for least effort, A wins. Agree?
GuardDuty with Runtime Monitoring (B) sounds close since it handles Lambda protection, but it won't scan container images in ECR for vulnerabilities. I remember GuardDuty is more about threat detection/runtime anomalies than explicit vulnerability scans. Picking B for the Lambda bit, but it's missing a piece for full coverage.
Pretty sure B covers Lambda protection, but I don’t think it scans container image vulnerabilities in ECR. From exam reports, B seems close but misses the ECR part.