Which combination of steps should the security engineer take to meet these requirements?
(Choose three.)
Create the S3 bucket. Configure server-side encryption with a customer managed KMS key.
Create the S3 bucket. Configure server-side encryption with customer-provided encryption keys (SSE-C).
Create the CloudFront distribution. Use the S3 bucket as the origin. Configure the distribution to use an origin access identity (OAI).
Create the CloudFront distribution. Use the S3 bucket as the origin. Delete the origin access identity (OAI) configuration.
Configure the CloudFront distribution cache to encrypt data at rest by using the customer managed KMS key.
Create a Lambda@Edge function that runs for origin request events and reads from the S3 bucket by using the customer managed KMS key.