AWS Certified Developer Associate DVA-C02 Practice Question
An application's deployment process requires secure retrieval of environment-specific settings and credentials for external services. Which service is best suited for handling this requirement, allowing for secure management and access during the deployment phase?
Opt for a service explicitly designed for secret management featuring key rotation, IAM integration, and encryption for protecting service credentials
Select a service facilitating feature flag and configuration data management with IAM role-based access for secure key retrieval
Place the sensitive service credentials in an encrypted storage service and control access through network endpoint policies
Implement a service for storing configuration data, ensuring encryption of the sensitive service credentials and IAM permissions for deployment retrieval