AWS Certified Developer Associate DVA-C02 Practice Question
An application running on an EC2 instance needs to securely interact with various cloud resources. To follow best security practices, you've assigned a particular role to the instance to facilitate this. Which method should your application use to authenticate service requests seamlessly?
Rely on the cloud SDK's default behavior to retrieve temporary security credentials provided through the instance's metadata.
Implement a custom script to fetch temporary security tokens using
GetSessionToken
for service request authorization.Embed a fixed set of security credentials within the application's source code to authenticate service requests.
Generate and use a dedicated set of long-term security credentials, storing them in the instance storage for service requests.