Which of the following are part of the seven design principles for security in the cloud? (Choose TWO)
A. Use manual monitoring techniques to protect your AWS resources.
B. Use IAM roles to grant temporary access instead of long-term credentials.
C. Scale horizontally to protect from failures.
D. Enable real-time traceability.
E. Never store sensitive data in the cloud.