Which combination of steps should the solutions architect take to accomplish this?

A company’s AWS architecture currently uses access keys and secret access keys stored on each instance to access AWS services. Database credentials are hard-coded on each instance. SSH keys for command-tine remote access are stored in a secured Amazon S3 bucket. The company has asked its solutions architect to improve the security posture of the architecture without adding operational complexity.

Which combination of steps should the solutions architect take to accomplish this? (Select THREE.)
A . Use Amazon EC2 instance profiles with an IAM role.
B . Use AWS Secrets Manager to store access keys and secret access keys.
C . Use AWS Systems Manager Parameter Store to store database credentials.
D . Use a secure fleet of Amazon EC2 bastion hosts (or remote access.
E . Use AWS KMS to store database credentials.
F . Use AWS Systems Manager Session Manager tor remote access

Answer: A,C,F

Explanation:

https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html

Latest SAP-C02 Dumps Valid Version with 318 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments