A company is building software on AWS that requires access to various AWS services. Which configuration should be used to ensure that AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not compromised?
A company is building software on AWS that requires access to various AWS services. Which configuration should be used to ensure that AWS credentials (i.e., Access Key ID/Secret Access Key combination) are not compromised?
A) Enable Multi-Factor Authentication for your AWS root account.
B) Assign an IAM role to the Amazon EC2 instance
C) Store the AWS Access Key ID/Secret Access Key combination in software comments.
D) Assign an IAM user to the Amazon EC2 Instance.