How can the developer expand the application to run in the destination Region while meeting the encryption requirement?

2 Comments

  1. Andrew
    Author

    I believe the answer is:
    Create new AMIs, and specify encryption parameters. Copy the encrypted AMIs to the destination Region. Delete the unencrypted AMIs.

  2. Caleb
    Author

    I systematize that the answer is:
    Create new AMIs, and specify encryption parameters. Copy the encrypted AMIs to the destination Region. Delete the unencrypted AMIs.

Leave a Reply

Your email address will not be published. Required fields are marked *

4 × 1 =