Examtopics

Professional Cloud DevOps Engineer
  • Topic 1 Question 58

    You are deploying an application that needs to access sensitive information. You need to ensure that this information is encrypted and the risk of exposure is minimal if a breach occurs. What should you do?

    • Store the encryption keys in Cloud Key Management Service (KMS) and rotate the keys frequently

    • Inject the secret at the time of instance creation via an encrypted configuration management system.

    • Integrate the application with a Single sign-on (SSO) system and do not expose secrets to the application.

    • Leverage a continuous build pipeline that produces multiple versions of the secret for each instance of the application.


    シャッフルモード