A development team stores its Amazon RDS MySQL DB instance user name and password credentials in a configuration file. The configuration file is stored as plaintext on the root device volume of the team's Amazon EC2 instance. When the team's application needs to reach the database, it reads the file and loads the credentials into the code. The team has modified the permissions of the configuration file so that only the application can read its content. A solutions architect must design a more secure solution.
What should the solutions architect do to meet this requirement?
Atanu_M
Highly Voted 3 years, 7 months agojkwek
Highly Voted 3 years, 6 months agoetheng1970
Most Recent 2 years, 9 months agoLakhsmi
3 years, 1 month agoJP_PA
3 years, 3 months agoFF11
3 years, 4 months agoSohan1311
3 years, 4 months agoUzi_m
2 years, 3 months agoananthkamath
3 years, 4 months agosguinales
3 years, 4 months agoaws_aspirant
3 years, 5 months agoecastilla
3 years, 6 months agomaigacribzz
3 years, 6 months agotheCreatorSD
3 years, 6 months agoismai1
3 years, 6 months agoKopa
3 years, 6 months agoKK_uniq
3 years, 6 months agoaesr10
3 years, 6 months agohaaris786
3 years, 7 months agoleliodesouza
3 years, 7 months ago