An advisory firm is creating a secure data analytics solution for its regulated financial services users. Users will upload their raw data to an Amazon S3 bucket, where they have PutObject permissions only. Data will be analyzed by applications running on an Amazon EMR cluster launched in a VPC. The firm requires that the environment be isolated from the internet. All data at rest must be encrypted using keys controlled by the firm.
Which combination of actions should the Solutions Architect take to meet the user's security requirements? (Choose two.)
ipindado2020
Highly Voted 3 years, 7 months agooraldevel
3 years, 7 months agoangelsrp
3 years, 7 months agotiana528
3 years, 5 months agoarulrajjayaraj
3 years, 6 months agoQCO
3 years, 6 months agoSunflyhome
3 years, 6 months agojoe16
3 years, 6 months agoNemer
Highly Voted 3 years, 7 months agomilofficial
Most Recent 2 years, 1 month agoStudent1950
2 years, 9 months agoaandc
2 years, 10 months agocldy
3 years, 5 months agoAzureDP900
3 years, 5 months agowakame
3 years, 6 months agoSuresh108
3 years, 6 months agodenccc
3 years, 6 months agoWhyIronMan
3 years, 6 months agopradhyumna
3 years, 6 months agoWaiweng
3 years, 6 months agoAmitv2706
3 years, 6 months agokiev
3 years, 6 months agokiev
3 years, 6 months agoKian1
3 years, 6 months ago