Which strategy should a solutions architect recommend to remediate these security risks?

A company runs an application on AWS. An AWS Lambda function uses credentials to authenticate to an Amazon RDS tor MySQL DB instance. A security risk assessment identified that these credentials are not frequently rotated. Also, encryption at rest is not enabled for the DB instance. The security team requires...

February 16, 2023 No Comments READ MORE +

What is the MOST operationally efficient solution that meets these requirements?

A company is planning to set up a REST API application on AWS. The application team wants to set up a new identity store on AWS. The IT team does not want to maintain any infrastructure or servers for this deployment. What is the MOST operationally efficient solution that meets...

February 16, 2023 No Comments READ MORE +

How can the acquired applications quickly be brought up to deployment standards while addressing the developers' concerns?

A company standardized its method of deploying applications to AWS using AWS CodePipeline and AWS Cloud Formation. The applications are in Typescript and Python. The company has recently acquired another business that deploys applications to AWS using Python scripts. Developers from the newly acquired company are hesitant to move their...

February 16, 2023 No Comments READ MORE +