Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
To safeguard sensitive information in an application deployment, minimizing exposure risks during a breach is crucial. Which strategies effectively enhance data security?
A
Leverage a continuous build pipeline to generate various secret versions for each application instance.
B
Incorporate Single Sign-On (SSO) for the application, keeping secrets hidden from it.
C
At instance creation, inject the secret through an encrypted configuration management system.
D
Regularly rotate encryption keys stored in Cloud Key Management Service (KMS) for enhanced security.