What should a solutions architect recommend to meet these requirements in the MOST secure manner?
A company has an application that calls AWS Lambda functions.A code review shows that database credentials are stored in a Lambda function’s source code, which violates the company’s security policy.The credentials must be securely stored and must be automatically rotated on an ongoing basis to meet security policy requirements.What should a solutions architect recommend to meet these requirements in the MOST secure manner?Read More →