A company has deployed its application on Amazon EC2 instances with an Amazon RDS database. The company used the principle of least privilege to configure the database access credentials. The company's security team wants to protect the application and the database from SQL injection and other web-based attacks.
Which solution will meet these requirements with the LEAST operational overhead?
Lachelle
5 months agoTarra
6 months agoScot
6 months agoAntione
6 months agoDoug
6 months agoRosita
6 months agoWeldon
6 months agoBerry
6 months agoColby
7 months agoViva
7 months agoJesusa
7 months agoLili
7 months agoTresa
7 months agoDerrick
11 months agoCordelia
11 months agoRosalia
10 months agoTrinidad
11 months agoVeronika
11 months agoMarguerita
11 months agoRobt
11 months agoBev
11 months agoChu
10 months agoMarva
10 months agoCecily
10 months agoLou
11 months agoGladys
1 year agoAmmie
1 year agoDorothy
1 year ago