Ultimate access to all questions.
A company is developing an AWS-based application to store sensitive data. The IT support team has access to the infrastructure, including databases. The security engineer needs to implement measures to safeguard sensitive data from breaches, reduce management overhead, and ensure regular rotation of database credentials. What measures should the security engineer recommend?