A company has deployed its application on Amazon EC2 instances with an Amazon RDS database. The company used the principle of least privilege to configure the database access credentials. The company's security team wants to protect the application and the database from SQL injection and other web-based attacks.
Which solution will meet these requirements with the LEAST operational overhead?
Andy_09
Highly Voted 1 year agoBillaRanga
Highly Voted 1 year ago03beafc
Most Recent 10 months agoTypewriter101
1 year ago