Q: 11
A CloudOps engineer needs to control access to groups of Amazon EC2 instances using AWS Systems
Manager Session Manager. Specific tags on the EC2 instances have already been added.
Which additional actions should the CloudOps engineer take to control access? (Select TWO.)
Options
Discussion
Probably A and E. You have to create an IAM policy with tag-based conditions (E) and attach it directly to users or groups needing SSM access (A). B is a common trap but that's for instance roles, not user session control.
A and E tbh
I don't think it's B, since that's more about the instance role itself, not user access. For controlling who can use Session Manager, you attach an IAM policy to users (A) and make it tag-based (E). Trap is confusing instance vs user access.
Probably A and E. You attach an IAM policy (A) to the user or group, then use a tag-based condition (E) to scope SSM access to those EC2 instances. Instance roles are for the instance, not user access. Makes sense to me but open to other takes.
A E, saw a similar question on a practice test. IAM policy (A) for users, with tag-based conditions (E).
A and E tbh. Tag-based IAM policies (E) are what restrict which EC2s you can access, and attaching the policy to users/groups (A) enforces it. The other options aren't really about SSM access control. Pretty sure that's right.
C/D? If you're focused on restricting at the instance level instead of user permissions, C or D feels tempting since they relate to grouping or accounts. Not sure they're right here though, because Session Manager is mostly IAM-driven.
A and E tbh. Controlling user access to SSM sessions needs an IAM policy with tag conditions plus attaching that policy to the right users/groups. Not totally sure if that's all the question wanted, but closest fit here.
AWS just loves to make this trickier than it needs to be, A and E.
A and E tbh, had something like this in a mock. You attach the IAM policy to users (A) and scope it to tagged instances via Condition (E). Attaching a role to the instance (B) just lets SSM connect, doesn't control user access directly. Agree?
Be respectful. No spam.