Which of the options below are recommendations in the security pillar of the well-architected framework? (choose 2)