A security engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password.
Which combination of steps can the engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)
aescudero51
6 months, 3 weeks agovikasj1in
11 months, 3 weeks ago3633f8f
1 year agorxhan
10 months, 1 week agoAamee
1 year, 1 month agoAamee
1 year, 1 month agoAgboolaKun
1 year, 1 month agoAamee
1 year, 1 month ago[Removed]
1 year, 1 month agooioi
1 year, 1 month ago