Ultimate access to all questions.
A company has recently experienced a security incident necessitating the restoration of Amazon EC2 instances from encrypted EBS snapshots using an AWS KMS customer managed key. In response to a gap analysis of their disaster recovery procedures and backup strategies, a security engineer is tasked with implementing a solution to ensure the recovery of EC2 instances even if the AWS account is compromised and the EBS snapshots are deleted. Which solution should the engineer implement to meet this requirement?