You are deploying an application that needs to access sensitive information. You need to ensure that this information is encrypted and the risk of exposure is minimal if a breach occurs. What should you do?
A.
Store the encryption keys in Cloud Key Management Service (KMS) and rotate the keys frequently
B.
Inject the secret at the time of instance creation via an encrypted configuration management system.
C.
Integrate the application with a Single sign-on (SSO) system and do not expose secrets to the application.
D.
Leverage a continuous build pipeline that produces multiple versions of the secret for each instance of the application.
A. Store the encryption keys in Cloud Key Management Service (KMS) and rotate the keys frequently. This ensures that the sensitive information is encrypted at rest and in transit, and that the encryption keys are regularly rotated to minimize the risk of exposure in the event of a breach.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
giammydell
Highly Voted 2 years, 6 months agojomonkp
Most Recent 4 months, 4 weeks agoJonathanSJ
1 year, 3 months agoWhyIronMan
1 year, 4 months agossmb
1 year, 6 months agoramzez4815
1 year, 7 months agoemdee202
2 years agoSekierer
2 years, 3 months agoTNT87
2 years, 6 months agoTNT87
2 years, 6 months agoAlaaelanwr
2 years, 6 months ago