AWS - Identity and Access ManagementAn IAM policy grants full access to S3 but denies DeleteObject on a specific bucket. Why does this violate least privilege?ABecause full access is granted, the deny is overriddenBBecause granting full access is too broad even with denyCBecause deny statements are ignored in IAM policiesDBecause DeleteObject is not a valid S3 actionCheck Answer
Step-by-Step SolutionSolution:Step 1: Understand policy effectFull access grants all actions; deny restricts one action on one bucket.Step 2: Analyze least privilege violationGranting full access is too broad; deny does not fix over-permission.Final Answer:Granting full access is too broad even with deny -> Option BQuick Check:Least privilege forbids broad allow with exceptions [OK]Quick Trick: Avoid broad allow; use specific allows instead [OK]Common Mistakes:Thinking deny overrides all allowAssuming deny statements are ignoredBelieving DeleteObject is invalid
Master "Identity and Access Management" in AWS9 interactive learning modes - each teaches the same concept differentlyLearnWhyDeepVisualTryChallengeProjectRecallTime
More AWS Quizzes AWS Account and Billing - Root user vs IAM user - Quiz 7medium AWS Account and Billing - Setting up billing alerts - Quiz 7medium Cloud Computing Fundamentals - Edge locations and CloudFront overview - Quiz 9hard EC2 Fundamentals - Instance states (running, stopped, terminated) - Quiz 15hard EC2 Fundamentals - Launching an EC2 instance - Quiz 6medium S3 Fundamentals - Creating S3 buckets - Quiz 4medium S3 Fundamentals - Why S3 matters for object storage - Quiz 9hard VPC Fundamentals - Creating a custom VPC - Quiz 10hard VPC Fundamentals - Why VPC provides network isolation - Quiz 8hard VPC Fundamentals - Creating a custom VPC - Quiz 11easy