AWS Certified Developer Associate DVA-C02 Practice Question
An application's deployment process requires secure retrieval of environment-specific settings and credentials for external services. Which service is best suited for handling this requirement, allowing for secure management and access during the deployment phase?
Opt for a service explicitly designed for secret management featuring key rotation, IAM integration, and encryption for protecting service credentials
Select a service facilitating feature flag and configuration data management with IAM role-based access for secure key retrieval
Implement a service for storing configuration data, ensuring encryption of the sensitive service credentials and IAM permissions for deployment retrieval
Place the sensitive service credentials in an encrypted storage service and control access through network endpoint policies