Which solution should the company’s security specialist recommend?
A company’s engineering team is developing a new application that creates AWS Key Management Service (AWS KMS) CMK grants for users.Immediately after a grant is created, users must be able to use the CMK to encrypt a 512-byte payload.During load testing, a bug appears intermittently whereAccessDeniedExceptions are occasionally triggered when a user first attempts to encrypt using the CMK.Which solution should the company’s security specialist recommend?Read More →