Ultimate access to all questions.
To safeguard sensitive information in an application deployment, minimizing exposure risks during a breach is crucial. Which strategies effectively enhance data security?
Explanation:
Storing encryption keys in Cloud Key Management Service (KMS) and rotating them periodically is the most secure approach. KMS offers a robust platform for key management, featuring audit logs, automatic key deletion, and key rotation. These measures significantly reduce the risk and impact of potential breaches by limiting unauthorized access duration.