Bird
0
0

This trust policy snippet causes the role to be assumable by no one:

medium📝 Debug Q7 of 15
AWS - Identity and Access Management
This trust policy snippet causes the role to be assumable by no one:
{"Statement": [{"Effect": "Allow", "Principal": {}, "Action": "sts:AssumeRole"}]}

What is the problem?
AEmpty Principal means no trusted entities
BEffect should be "Deny"
CAction is incorrect
DStatement must be a string
Step-by-Step Solution
Solution:
  1. Step 1: Analyze Principal content

    Principal is empty, so no entity is trusted to assume the role.
  2. Step 2: Check other fields

    Effect "Allow" and Action "sts:AssumeRole" are correct, Statement is an array.
  3. Final Answer:

    Empty Principal means no trusted entities -> Option A
  4. Quick Check:

    Empty Principal = no one can assume role [OK]
Quick Trick: Principal must list trusted entities; empty means none [OK]
Common Mistakes:
MISTAKES
  • Thinking empty Principal allows all
  • Changing Effect to Deny to fix
  • Misunderstanding Action field

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More AWS Quizzes