
Ultimate access to all questions.
Your company is implementing a new data processing pipeline that involves data transfer between multiple AWS services. You need to design a monitoring solution that ensures data integrity and security during the transfer process. Which of the following steps should be included in your design?
A
Enable data encryption in transit between the services and monitor the encryption status.
B
Implement access controls to restrict access to the data transfer process.
C
Monitor the performance metrics of the data transfer process, such as throughput and latency.
D
Set up alerts for any unauthorized access attempts to the data transfer process.