ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 106 - SAA-C03 discussion

Report
Export

A company is preparing to store confidential data in Amazon S3 For compliance reasons the data must be encrypted at rest Encryption key usage must be logged tor auditing purposes. Keys must be rotated every year. Which solution meets these requirements and «the MOST operationally efferent?

A.
Server-side encryption with customer-provided keys (SSE-C)
Answers
A.
Server-side encryption with customer-provided keys (SSE-C)
B.
Server-side encryption with Amazon S3 managed keys (SSE-S3)
Answers
B.
Server-side encryption with Amazon S3 managed keys (SSE-S3)
C.
Server-side encryption with AWS KMS (SSE-KMS) customer master keys (CMKs) with manual rotation
Answers
C.
Server-side encryption with AWS KMS (SSE-KMS) customer master keys (CMKs) with manual rotation
D.
Server-side encryption with AWS KMS (SSE-KMS) customer master keys (CMKs) with automate rotation
Answers
D.
Server-side encryption with AWS KMS (SSE-KMS) customer master keys (CMKs) with automate rotation
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html When you enable automatic key rotation for a customer managed key, AWS KMS generates new cryptographic material for the KMS key every year. AWS KMS also saves the KMS key's older cryptographic material in perpetuity so it can be used to decrypt data that the KMS key encrypted. Key rotation in AWS KMS is a cryptographic best practice that is designed to be transparent and easy to use. AWS KMS supports optional automatic key rotation only for customer managed CMKs. Enable and disable key rotation. Automatic key rotation is disabled by default on customer managed CMKs.

When you enable (or re-enable) key rotation, AWS KMS automatically rotates the CMK 365 days after the enable date and every 365 days thereafter.

asked 16/09/2024
Jack de Cort
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first