Valid SC-300 Dumps shared by ExamDiscuss.com for Helping Passing SC-300 Exam! ExamDiscuss.com now offer the newest SC-300 exam dumps, the ExamDiscuss.com SC-300 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com SC-300 dumps with Test Engine here:
Access SC-300 Dumps Premium Version
(340 Q&As Dumps, 35%OFF Special Discount Code: freecram)
Recent Comments (The most recent comments are at the top.)
To ensure that AKS1 can access DB1 using its managed identity while following the principle of least privilege, the best option is:
**A. For DB1, assign the Azure Cosmos DB Account Reader Role role.**
Here's the reasoning behind this choice:
1. **Managed Identity**: The question states that AKS1 uses a managed identity, which is the recommended way for Azure resources to access other Azure resources securely without storing credentials in code.
2. **Principle of Least Privilege**: This principle dictates that we should grant only the minimum permissions necessary to perform the required tasks.
3. **Scope**: We want to provide access specifically to DB1, not to the entire resource group or subscription.
4. **Required Access**: The AKS cluster needs to read from the Cosmos DB database.
Let's examine why the other options are not optimal:
B. **Azure Cosmos DB Data Reader Role for RG1**: While this would provide the necessary access, assigning it at the resource group level is broader than necessary and violates the principle of least privilege.
C. **Reader role for RG1**: This is too broad as it provides read access to all resources in the resource group, not just the Cosmos DB database. It also may not provide the specific permissions needed to read data from Cosmos DB.
D. **Owner role for Sub1**: This is far too permissive, granting full access to all resources in the entire subscription, which severely violates the principle of least privilege.
The Azure Cosmos DB Account Reader Role provides the necessary permissions to read data from a Cosmos DB account without granting unnecessary privileges. It's scoped directly to the DB1 resource, adhering to the principle of least privilege while ensuring AKS1 can access the database using its managed identity....