A Security Engineer is looking for a way to control access to data that is being encrypted under a CMK. The Engineer is also looking to use additional authenticated data (AAD) to prevent tampering with ciphertext.
Which action would provide the required functionality?
joeboy
Highly Voted 3 years, 9 months agogfhbox0083
Highly Voted 3 years, 8 months agoRaphaello
Most Recent 1 year, 4 months agoaddy_prepare
1 year, 10 months agosoyyodario
2 years agoITGURU51
2 years, 1 month agoNikhil0222
2 years, 2 months agoITGURU51
2 years, 3 months agoSarksa
2 years, 11 months agoTigerInTheCloud
3 years, 2 months agoRadhaghosh
3 years, 5 months agoLarsson
3 years, 8 months agoawssecuritynewbie
3 years, 8 months agowzlinux
3 years, 8 months agotesting4321
3 years, 8 months agoRaySmith
3 years, 9 months agoluis12345
3 years, 9 months ago