security video for a project manager has connected with you for a security requirement from the client. The client wants to ensure that the authenticated
A project manager has connected with you for a security requirement from the client. The client wants to ensure that the authenticated encryption with associated data encryption is used when calling AWS Key Management Service (AWS KMS) Encrypt, Decrypt, and ReEncrypt APIs. As an AWS Certified Security Specialist, which of the following would you recommend to address this requirement?