How can the developer expand the application to run in the destination Region while meeting the encryption requirement?

1 Comment

  1. Andrew
    Author

    I believe the answer is:
    Create new AMIs, and specify encryption parameters. Copy the encrypted AMIs to the destination Region. Delete the unencrypted AMIs.

Leave a Reply to Andrew Cancel reply

Your email address will not be published. Required fields are marked *

fourteen + 15 =