A company is storing sensitive user information in an Amazon S3 bucket. The company wants to provide secure access to this bucket from the application tier running on Amazon EC2 instances inside a VPC.
Which combination of steps should a solutions architect take to accomplish this? (Choose two.)
syu31svc
Highly Voted 3 years, 6 months agodmscountera
Highly Voted 3 years, 7 months agorushi0611
Most Recent 2 years agoVantirup
2 years, 8 months agorav009
3 years, 5 months agoKK_uniq
3 years, 6 months agowaqas
3 years, 6 months agoSallywhite
3 years, 7 months agoadmin1
3 years, 7 months agohndok
3 years, 7 months ago