AWS Certified Developer Associate DVA-C02 Practice Question
In a scenario where your team of developers needs to connect application servers securely to various cloud-based services without embedding sensitive credentials in the codebase, which method would be MOST appropriate to facilitate authentication and maintain security best practices?
Upload the SSH keys to a widely readable file storage service to allow anytime access for the development team, aiming to simplify their usage.
Utilize an identity and access management service to create roles tied to the server instances, thereby allowing the automatic provisioning of temporary credentials that facilitate secure communications.
Include the requisite SSH keys in the codebase itself, making them part of the application's version control to simplify access.
Embed the generation and storage of SSH keys directly in the environment variables, relying on them to establish secure connections.
Creating roles with the necessary permissions through an identity and access management service allows application servers to securely authenticate and communicate with cloud services. This method involves leveraging temporary, dynamically rotated security credentials, which obviates the need to embed long-term keys or secrets within the application. Storing SSH keys in an environment variable or codebase can create security risks due to the keys' exposure and the complexities involved in their rotation. While SSH keys are part of securing access to computing resources, identity roles are specifically tailored to authorize interactions with various cloud services by providing a manageable, automated way of handling credentials.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an identity and access management service in the context of AWS?
Open an interactive chat with Bash
How do temporary credentials enhance security in AWS applications?
Open an interactive chat with Bash
Why is embedding SSH keys directly in the codebase considered a bad practice?
Open an interactive chat with Bash
AWS Certified Developer Associate DVA-C02
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Information Technology Package Join Premium for Full Access