A security engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password.
Which combination of steps can the engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)
aescudero51
2 months, 3 weeks agovikasj1in
7 months, 3 weeks ago3633f8f
8 months, 3 weeks agorxhan
6 months, 1 week agoAamee
9 months agoAamee
9 months, 1 week agoAgboolaKun
9 months, 1 week agoAamee
9 months ago[Removed]
9 months, 1 week agooioi
9 months, 2 weeks ago