As a Solutions Architect for TPT Ltd., Adam is in charge of creating a shared service for hosting containers from various customers on Amazon ECS. There are many AWS services that these containers will use. The data from one customer's container must not be accessible by that of another customer, as required. To satisfy the above requirements, Adam has been asked to propose a suitable solution. In this circumstance, what should he do?
-
A
IAM Instance profile for EC2 Instances
-
B
Security Group rules
-
C
IAM roles for tasks
-
D
C85IAM roles for EC2 Instances