A security engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password.
Which combination of steps can the engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)
aescudero51
5 months agovikasj1in
10 months ago3633f8f
11 months agorxhan
8 months, 3 weeks agoAamee
11 months, 2 weeks agoAamee
11 months, 3 weeks agoAgboolaKun
11 months, 3 weeks agoAamee
11 months, 2 weeks ago[Removed]
11 months, 3 weeks agooioi
11 months, 3 weeks ago