When combination of actions should the security team take to make the application compliant within the security policy?

A recent security audit identified that a company’s application team injects database credentials into the environment variables of an AWS Fargate task. The company’s security policy mandates that all sensitive data be encrypted at rest and in transit.

When combination of actions should the security team take to make the application compliant within the security policy? (Select THREE)
A . Store the credentials securely in a file in an Amazon S3 bucket with restricted access to the application team IAM role Ask the application team to read the credentials from the S3 object instead
B . Create an AWS Secrets Manager secret and specify the key/value pairs to be stored in this secret
C . Modify the application to pull credentials from the AWS Secrets Manager secret instead of the environment variables.
D . Add the following statement to the container instance IAM role policy
E . Add the following statement to the execution role policy.
F . Log in to the AWS Fargate instance, create a script to read the secret value from AWS Secret Manager, and inject the environment variables. Ask the application team to redeploy the application.

Answer: B,E,F

Latest SCS-C01 Dumps Valid Version with 470 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments