A company has deployed its application on Amazon EC2 instances with an Amazon RDS database. The company used the principle of least privilege to configure the database access credentials. The company's security team wants to protect the application and the database from SQL injection and other web-based attacks.
Which solution will meet these requirements with the LEAST operational overhead?
Lachelle
4 months agoTarra
4 months agoScot
4 months agoAntione
4 months agoDoug
4 months agoRosita
5 months agoWeldon
5 months agoBerry
5 months agoColby
5 months agoViva
5 months agoJesusa
5 months agoLili
5 months agoTresa
5 months agoDerrick
9 months agoCordelia
9 months agoRosalia
8 months agoTrinidad
9 months agoVeronika
9 months agoMarguerita
9 months agoRobt
9 months agoBev
9 months agoChu
8 months agoMarva
8 months agoCecily
8 months agoLou
9 months agoGladys
10 months agoAmmie
10 months agoDorothy
11 months ago