A company recently performed a security audit of all its internal applications developed in house. Certain business-critical applications that handle sensitive data were flagged because they use Amazon ES clusters that are open for read/write to a wider user group that intended.
Who is responsible for correcting the issue?
A. AWS Premium Support
B. the Amazon ES team
C. the AWS IAM team
D. a SysOps Administrator
Who is responsible for correcting the issue?
A. AWS Premium Support
B. the Amazon ES team
C. the AWS IAM team
D. a SysOps Administrator