Which combination of steps should the solutions architect take to accomplish this?
A company’s AWS architecture currently uses access keys and secret access keys stored on each instance to access AWS services.Database credentials are hard-coded on each instance.SSH keys for command-line remote access are stored in a secured Amazon S3 bucket.The company has asked its solutions architect to improve the security posture of the architecture without adding operational complexity.Which combination of steps should the solutions architect take to accomplish this? (Choose three.)Read More →