A company’s application runs on an Amazon EC2 instance and stores objects in an Amazon S3 bucket. The EC2 instance is using an instance profile that provides access to read and write objects in the S3 bucket. The S3 bucket contains objects and has not been configured for any encryption at rest. The company is adopting a new security policy that mandates encryption at rest for all S3 buckets, encryption at rest for all objects in S3 buckets, and key rotation once every year.
What should a security engineer do to meet these requirements?
AdamWest
Highly Voted 2 years, 8 months agokomik_101
2 years, 1 month agokomik_101
Most Recent 2 years, 1 month agofrancinetanzx
2 years, 1 month ago6_8ftwin
2 years, 2 months agoOCHT
2 years, 2 months agojishrajesh
2 years, 7 months agotainh
2 years, 8 months ago