A company has deployed its application on Amazon EC2 instances with an Amazon RDS database. The company used the principle of least privilege to configure the database access credentials. The company's security team wants to protect the application and the database from SQL injection and other web-based attacks.
Which solution will meet these requirements with the LEAST operational overhead?
Andy_09
Highly Voted 9 months, 2 weeks ago03beafc
Most Recent 7 months agoBillaRanga
9 months, 1 week agoTypewriter101
9 months, 1 week ago