
Ultimate access to all questions.
You are developing an application with multiple microservices deployed in a Google Kubernetes Engine (GKE) cluster. One microservice requires a connection to an on-premises third-party database. How should you securely store and manage the database credentials while enabling credential rotation in alignment with security best practices?
A
Store the credentials in a sidecar container proxy, and use it to connect to the third-party database.
B
Configure a service mesh to allow or restrict traffic from the Pods in your microservice to the database.
C
Store the credentials in an encrypted volume mount, and associate a Persistent Volume Claim with the client Pod.
D
Store the credentials as a Kubernetes Secret, and use the Cloud Key Management Service plugin to handle encryption and decryption.