What should the security engineer do next to meet these requirements?
A company’s application uses Amazon DynamoDB to store data.The company’s security policy requires all data to be encrypted at rest.The security policy also requires the company to use an on-premises hardware security module (HSM) to generate and manage the company’s encryption keys.A security engineer uses the on-premises HSM to generate an encryption key.What should the security engineer do next to meet these requirements?Read More →