How can the developer expand the application to run in the destination Region while meeting the encryption requirement?

2 Comments

  1. Helen
    Author

    I systematize that the answer is:
    Create a new AMIs, and specify encryption parameters. Copy the encrypted AMIs to the destination Region. Delete the unencrypted AMIs.

  2. Jacob
    Author

    From my point of view, the answer is:
    Create a new AMIs, and specify encryption parameters. Copy the encrypted AMIs to the destination Region. Delete the unencrypted AMIs.

Leave a Reply

Your email address will not be published. Required fields are marked *

three − one =