ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 800 - SAA-C03 discussion

Report
Export

A company runs an environment where data is stored in an Amazon S3 bucket. The objects are accessed frequently throughout the day. The company has strict data encryption requirements for data that is stored in the S3 bucket. The company currently uses AWS Key Management Service (AWS KMS) for encryption.

The company wants to optimize costs associated with encrypting S3 objects without making additional calls to AWS KMS.

Which solution will meet these requirements?

A.
Use server-side encryption with Amazon S3 managed keys (SSE-S3).
Answers
A.
Use server-side encryption with Amazon S3 managed keys (SSE-S3).
B.
Use an S3 Bucket Key for server-side encryption with AWS KMS keys (SSE-KMS) on the new objects.
Answers
B.
Use an S3 Bucket Key for server-side encryption with AWS KMS keys (SSE-KMS) on the new objects.
C.
Use client-side encryption with AWS KMS customer managed keys.
Answers
C.
Use client-side encryption with AWS KMS customer managed keys.
D.
Use server-side encryption with customer-provided keys (SSE-C) stored in AWS KMS.
Answers
D.
Use server-side encryption with customer-provided keys (SSE-C) stored in AWS KMS.
Suggested answer: B

Explanation:

An S3 Bucket Key reduces the cost of using AWS KMS for server-side encryption by decreasing the number of requests made to KMS. By enabling S3 Bucket Key, the company can meet its encryption requirements with KMS keys while optimizing costs by reducing the number of KMS API requests.

Key AWS features:

Cost Optimization: S3 Bucket Keys reduce the frequency of KMS calls, optimizing the cost associated with encryption while still using AWS KMS for key management.

Compliance with KMS Encryption: This solution continues to meet the strict encryption requirements of the company by using KMS managed keys.

AWS Documentation: Using an S3 Bucket Key is recommended for organizations looking to optimize encryption costs without compromising security.

asked 16/09/2024
Sumit Dhar
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first