Which steps should the solutions architect take to meet these requirements?
A financial services company logs personally identifiable information to its application logs stored in Amazon S3.Due to regulatory compliance requirements, the log files must be encrypted at rest.The security team has mandated that the company’s on-premises hardware security modules (HSMs) be used to generate theCMK material.Which steps should the solutions architect take to meet these requirements?Read More →