A company's AWS architecture currently uses access keys and secret access keys stored on each instance to access AWS services. Database credentials are hard-coded on each instance. SSH keys for command-line remote access are stored in a secured Amazon S3 bucket. The company has asked its solutions architect to improve the security posture of the architecture without adding operational complexity.
Which combination of steps should the solutions architect take to accomplish this? (Choose three.)
wasabidev
Highly Voted 3 years, 7 months agocnethers
Highly Voted 3 years, 7 months agoggrodskiy
Most Recent 1 year, 10 months agoSkyZeroZx
1 year, 10 months ago[Removed]
2 years, 2 months agoevargasbrz
2 years, 4 months agognic
2 years, 8 months agoJYZ
3 years agocldy
3 years, 5 months agoAzureDP900
3 years, 5 months agoacloudguru
3 years, 5 months agoandylogan
3 years, 6 months agoKopa
3 years, 6 months agotgv
3 years, 6 months agoblackgamer
3 years, 6 months agoWhyIronMan
3 years, 6 months agovimgoru24
3 years, 6 months ago