How can the developer expand the application to run in the destination Region while meeting the encryption requirement?

1 Comment

  1. Helen
    Author

    I systematize that the answer is:
    Create a new AMIs, and specify encryption parameters. Copy the encrypted AMIs to the destination Region. Delete the unencrypted AMIs.

Leave a Reply

Your email address will not be published. Required fields are marked *

9 − five =