A Security Engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance and authenticates with a user name and password.
Which combination of steps can the Engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose two.)
RaySmith
Highly Voted 3 years, 7 months agoChauPhan
Highly Voted 3 years, 6 months agoITGURU51
Most Recent 2 years, 1 month agodcasabona
2 years, 9 months agoMoreOps
3 years agoDerekKey
3 years, 6 months agoDaniel76
3 years, 6 months agocontinent34
3 years, 6 months agoLarsson
3 years, 6 months agoZia842
3 years, 6 months agoZia842
3 years, 6 months agoHuy
3 years, 6 months agoKdosec
3 years, 6 months agoDanMuniz
3 years, 7 months agoPeppaPig
3 years, 7 months agosunnybunny
3 years, 7 months agordy4u
3 years, 7 months agoawssecuritynewbie
3 years, 7 months agosunnybunny
3 years, 7 months agoscuzzy2010
3 years, 6 months agoawssecuritynewbie
3 years, 7 months ago