A company manages and runs a critical data management application in containers that are hosted on Amazon Elastic Container Service (Amazon ECS). The application has endpoints that are exposed through Application Load Balancers (ALBs). The application uses an Amazon Elastic File System (Amazon EFS) file system mount for persistent data storage. The company has configured Amazon ECS to use a minimal IAM instance role.
Which combination of actions should a solutions architect take to improve the overall security posture of the application? (Choose two.)
BECAUSE
1 year, 11 months agonymets
2 years, 7 months agoatsekov1
2 years, 8 months agoguptatrng
2 years, 8 months ago