A company's AWS architecture currently uses access keys and secret access keys stored on each instance to access AWS services. Database credentials are hard-coded on each instance. SSH keys for command-line remote access are stored in a secured Amazon S3 bucket. The company has asked its solutions architect to improve the security posture of the architecture without adding operational complexity.
Which combination of steps should the solutions architect take to accomplish this? (Choose three.)
wasabidev
Highly Voted 3 years, 2 months agocnethers
Highly Voted 3 years, 1 month agoggrodskiy
Most Recent 1 year, 4 months agoSkyZeroZx
1 year, 5 months ago[Removed]
1 year, 9 months agoevargasbrz
1 year, 11 months agognic
2 years, 3 months agoJYZ
2 years, 7 months agocldy
2 years, 12 months agoAzureDP900
2 years, 12 months agoacloudguru
3 years agoandylogan
3 years, 1 month agoKopa
3 years, 1 month agotgv
3 years, 1 month agoblackgamer
3 years, 1 month agoWhyIronMan
3 years, 1 month agovimgoru24
3 years, 1 month ago