AWS Certified Developer Associate DVA-C02 Practice Question
An application running on an EC2 instance needs to securely interact with various cloud resources. To follow best security practices, you've assigned a particular role to the instance to facilitate this. Which method should your application use to authenticate service requests seamlessly?
Implement a custom script to fetch temporary security tokens using
GetSessionToken
for service request authorization.Generate and use a dedicated set of long-term security credentials, storing them in the instance storage for service requests.
Rely on the cloud SDK's default behavior to retrieve temporary security credentials provided through the instance's metadata.
Embed a fixed set of security credentials within the application's source code to authenticate service requests.