The InfoSec team has asked the SysOps Administrator to perform some hardening on the company Amazon RDS database instances.
Based on this requirement, what actions should be recommended for the start of the security review? (Choose two.)
A. Use Amazon Inspector to present a detailed report of security vulnerabilities across the RDS database fleet
B. Review the security group’s inbound access rules for least privilege
C. Export AWS CloudTrail entries detailing all SSH activity on the RDS instances
D. Use the cat command to enumerate the allowed SSH keys in ~/.ssh on each RDS instance
E. Report on the Parameter Group settings and ensure that encrypted connections are enforced
Based on this requirement, what actions should be recommended for the start of the security review? (Choose two.)
A. Use Amazon Inspector to present a detailed report of security vulnerabilities across the RDS database fleet
B. Review the security group’s inbound access rules for least privilege
C. Export AWS CloudTrail entries detailing all SSH activity on the RDS instances
D. Use the cat command to enumerate the allowed SSH keys in ~/.ssh on each RDS instance
E. Report on the Parameter Group settings and ensure that encrypted connections are enforced