A company is using an existing orchestration tool to manage thousands of Amazon EC2 instances. A recent penetration test found a vulnerability in the company's software stack. This vulnerability has prompted the company to perform a full evaluation of its current production environment. The analysis determined that the following vulnerabilities exist within the environment:
✑ Operating systems with outdated libraries and known vulnerabilities are being used in production.
✑ Relational databases hosted and managed by the company are running unsupported versions with known vulnerabilities.
✑ Data stored in databases is not encrypted.
The solutions architect intends to use AWS Config to continuously audit and assess the compliance of the company's AWS resource configurations with the company's policies and guidelines.
What additional steps will enable the company to secure its environments and track resources while adhering to best practices?
liono
Highly Voted 3 years, 7 months agoEbi
Highly Voted 3 years, 6 months agoAzureDP900
Most Recent 3 years, 4 months agoKopa
3 years, 6 months agotgv
3 years, 6 months agoSuresh108
3 years, 6 months agoWhyIronMan
3 years, 6 months agoWaiweng
3 years, 6 months agoKian1
3 years, 6 months agoBulti
3 years, 6 months agoT14102020
3 years, 7 months agojackdryan
3 years, 7 months agoliono
3 years, 7 months ago