This is a dedicated watch page for a single video.
The Fintech startup Innovatech's Cloud Engineering team is migrating their monolithic web application to a microservices architecture on AWS using containers. After deploying the application to an Amazon ECS cluster, what steps are required to configure network permissions and IAM privileges according to Innovatech's security policy of least privilege? (Choose two.)