Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
How can you securely deploy an application that requires access to sensitive information while ensuring the data is encrypted and the risk of exposure is minimized in case of a breach?
A
Store the encryption keys in Cloud Key Management Service (KMS) and rotate the keys frequently
B
Inject the secret at the time of instance creation via an encrypted configuration management system.
C
Integrate the application with a Single sign-on (SSO) system and do not expose secrets to the application.
D
Leverage a continuous build pipeline that produces multiple versions of the secret for each instance of the application.