An application running on an EC2 instance needs to securely interact with various cloud resources. To follow best security practices, you've assigned a particular role to the instance to facilitate this. Which method should your application use to authenticate service requests seamlessly?
Rely on the cloud SDK's default behavior to retrieve temporary security credentials provided through the instance's metadata.
Embed a fixed set of security credentials within the application's source code to authenticate service requests.
Generate and use a dedicated set of long-term security credentials, storing them in the instance storage for service requests.
Implement a custom script to fetch temporary security tokens using GetSessionToken
for service request authorization.