D. Apply security requirements at all layers of a process.
"Apply security at all layers: Apply a defense in depth approach with multiple security controls. Apply to all layers (for example, edge of network, VPC, load balancing, every instance and compute service, operating system, application, and code)."
https://docs.aws.amazon.com/wellarchitected/latest/framework/sec-design.html
The correct answer is D.
Applying security requirements at all layers of a process is in compliance with the guidance in the security pillar of the AWS well-architected framework. This includes applying security controls at the network, host, application, and data layers. This approach helps to protect against threats and reduce risk.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Pranava_GCP
1 year, 9 months agojahmad0730
1 year, 10 months agoMadbo
2 years ago