During a security review, a company identified a vulnerability in an AWS Glue job. The company discovered that credentials to access an Amazon Redshift cluster were hard coded in the job script.
A data engineer must remediate the security vulnerability in the AWS Glue job. The solution must securely store the credentials.
Which combination of steps should the data engineer take to meet these requirements? (Choose two.)
GiorgioGss
Highly Voted 7 months, 2 weeks agodamaldon
Most Recent 7 months, 4 weeks agorralucard_
9 months ago