A security engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password.
Which combination of steps can the engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)
aescudero51
5 months, 3 weeks agovikasj1in
10 months, 3 weeks ago3633f8f
11 months, 3 weeks agorxhan
9 months, 1 week agoAamee
1 year agoAamee
1 year agoAgboolaKun
1 year agoAamee
1 year ago[Removed]
1 year agooioi
1 year ago