190.
No.190
A company's application teams use AWS CodeCommit repositories for their applications. The application teams have repositories in multiple AWS accounts. All accounts are in an organization in AWS Organizations.
Each application team uses AWS IAM Identity Center (AWS Single Sign-On) configured with an external IdP to assume a developer IAM role. The developer role allows the application teams to use Git to work with the code in the repositories.
A security audit reveals that the application teams can modify the main branch in any repository. A DevOps engineer must implement a solution that allows the application teams to modify the main branch of only the repositories that they manage.
Which combination of steps will meet these requirements? (Choose three.)
A. Update the SAML assertion to pass the user's team name. Update the IAM role's trust policy to add an access-team session tag that has the team name.
B. Create an approval rule template for each team in the Organizations management account. Associate the template with all the repositories. Add the developer role ARN as an approver.
C. Create an approval rule template for each account. Associate the template with all repositories. Add the "aws:ResourceTag/access-team": "$ ;{aws:PrincipalTag/access-team}" condition to the approval rule template.
D. For each CodeCommit repository, add an access-team tag that has the value set to the name of the associated team.
E. Attach an SCP to the accounts. Include the following statement: { "Effect": "Deny", "Action": [ "codecommit:GitPush", "codecommit:PutFile", "codecommit:Merge*" ], "Resource": "*", "Condition": { "StringEqualsIfExists": { "codecommit:References": ["refs/heads/main"] }, "StringNotEquals": { "aws:ResourceTag/access-team": "${aws:PrincipalTag/access-team}" }, "Null": { "codecommit:References": "false" } } }
F. Create an IAM permissions boundary in each account. Include the following statement: { "Effect": "Allow", "Action": [ "codecommit:GitPush", "codecommit: PutFile", "codecommit:Merge*" ], "Resource": "*", "Condition": { "StringEqualsIfExists": { "codecommit: References": ["refs/heads/main"] }, "StringNotEquals": { "aws: ResourceTag/access-team": "$ ; (aws: PrincipalTag/access-team}" }, "Null": { "codecommit: References": "false" } } }