Free AWS Certified Developer Associate DVA-C02 Practice Question

In a scenario where your team of developers needs to connect application servers securely to various cloud-based services without embedding sensitive credentials in the codebase, which method would be MOST appropriate to facilitate authentication and maintain security best practices?

  • Include the requisite SSH keys in the codebase itself, making them part of the application's version control to simplify access.

  • Embed the generation and storage of SSH keys directly in the environment variables, relying on them to establish secure connections.

  • Upload the SSH keys to a widely readable file storage service to allow anytime access for the development team, aiming to simplify their usage.

  • Utilize an identity and access management service to create roles tied to the server instances, thereby allowing the automatic provisioning of temporary credentials that facilitate secure communications.

This question's topic:
AWS Certified Developer Associate DVA-C02 / 
Security
Your Score:

Check or uncheck an objective to set which questions you will receive.