A security engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password.
Which combination of steps can the engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)
aescudero51
3 months, 3 weeks agovikasj1in
8 months, 3 weeks ago3633f8f
9 months, 3 weeks agorxhan
7 months, 1 week agoAamee
10 months, 1 week agoAamee
10 months, 2 weeks agoAgboolaKun
10 months, 1 week agoAamee
10 months, 1 week ago[Removed]
10 months, 2 weeks agooioi
10 months, 2 weeks ago