exam questions

Exam ANS-C00 All Questions

View all questions & answers for the ANS-C00 exam

Exam ANS-C00 topic 1 question 11 discussion

Exam question from Amazon's ANS-C00
Question #: 11
Topic #: 1
[All ANS-C00 Questions]

An organization processes consumer information submitted through its website. The organization's security policy requires that personally identifiable information
(PII) elements are specifically encrypted at all times and as soon as feasible when received. The front-end Amazon EC2 instances should not have access to decrypted PII. A single service within the production VPC must decrypt the PII by leveraging an IAM role.
Which combination of services will support these requirements? (Choose two.)

  • A. Amazon Aurora in a private subnet
  • B. Amazon CloudFront using AWS Lambda@Edge
  • C. Customer-managed MySQL with Transparent Data Encryption
  • D. Application Load Balancer using HTTPS listeners and targets
  • E. AWS Key Management Services
Show Suggested Answer Hide Answer
Suggested Answer: CE 🗳️
References:
https://noise.getoto.net/tag/aws-kms/

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
PANDU
Highly Voted 3 years, 8 months ago
Its BE, cloudfront can do field level encrytion using KMS, ALB can't use KMS
upvoted 26 times
PANDU
3 years, 8 months ago
The question also mentions that requiring IAM role which means that data has to be KMS encrypted. But question is where will you encrypt it , there is no other place except Lambda @edge before even reaching any server
upvoted 3 times
aviz
3 years, 8 months ago
Is there any doc which says it cloudfront can so FLE using KMS?
upvoted 1 times
TarunB
3 years, 8 months ago
https://aws.amazon.com/blogs/security/how-to-enhance-the-security-of-sensitive-customer-data-by-using-amazon-cloudfront-field-level-encryption/
upvoted 3 times
liteup
3 years, 7 months ago
this link is the best reference for this answer: B & E - CloudFront field-level encryption helps secure sensitive data such as a customer phone numbers by adding another security layer to CloudFront HTTPS. - The Parameter Store provides a centralized location for managing your configuration data such as plaintext data (such as database strings) or secrets (such as passwords) that are encrypted using AWS Key Management Service (AWS KMS).
upvoted 1 times
...
...
...
AdamSmith
3 years, 8 months ago
Agree, "as soon as feasible" implying the use of Lambda@Edge, also as TarunB posted there is a AWS case study that has almost the same requirements. ALB with HTTPS only encrypts the data in transit, not at rest, no remedy for this problem is mentioned.
upvoted 2 times
...
...
Huy
3 years, 7 months ago
Your answer is correct but you missed the Lambda@Edge. In this scenario, Lambda@Edge will be use to encrypt PII data using KMS CMK then decrypt it before response to client. Field level encryption doesn't handle decryption.
upvoted 1 times
...
...
inf
Highly Voted 3 years, 7 months ago
Answer: B, E Have the website write PII to S3 via CLoudFront/Lambda@Edge into an S3 bucket, encrypted using KMS keys. Have the website call for the PII via CloudFront/Lambda@Edge, using KMS to decrypt the S3 objects. A - incorrect - huh? B - correct C - incorrect - If the EC2 instance uses a role to encrypt the PII, it must also use that same role to decrypt the PII - thus storing it in whatever system effectively gives it access read the data D - incorrect - (sort of) - HTTPS is also possible via CloudFront, which makes this answer redundant E - correct - KMS to encrypt/decrypt https://aws.amazon.com/blogs/networking-and-content-delivery/serving-sse-kms-encrypted-content-from-s3-using-cloudfront/
upvoted 11 times
StelSen
3 years, 7 months ago
This solution will work. I have no doubt about it. But how about this requirement? "A single service within the production VPC must decrypt the PII by leveraging an IAM role." Decryption has to happen by a service within a production VPC. Not at Edge
upvoted 1 times
...
...
PavanKushwah123
Most Recent 2 years, 5 months ago
Correct Answer CE
upvoted 1 times
...
CloudBourne
2 years, 5 months ago
Answer - CE Customer is not manually entering their information rather it's been fed through a customer website (so customer side sql data encryption is valid) and application on AWS receives this encrypted data and production server can decrypt it with right IAM permission on the KMS key (CMK - Customer Managed Key).
upvoted 1 times
...
hecong
2 years, 11 months ago
Selected Answer: BE
https://aws.amazon.com/blogs/security/how-to-protect-sensitive-data-for-its-entire-lifecycle-in-aws/
upvoted 1 times
...
clooudy
3 years ago
Selected Answer: BE
Answer B and E
upvoted 1 times
...
jyrajan69
3 years, 4 months ago
Why would you need CloudFront to do encryption? The question clearly says "all aspects of personally identifiable information (PII) must be encrypted at all times and as soon as possible after receipt"...first part satisfied by ALB that encrypts the data at transit and then inside the VPC its KMS. So have no idea why most are looking at Cloudfront. Its clearly D and E
upvoted 1 times
...
shammous
3 years, 6 months ago
B: "... as soon as possible after receipt" means that data needs to be processed at edge E: KMS for encryption
upvoted 1 times
...
StelSen
3 years, 7 months ago
Everyone agreed to E. So, let's look at B or D B. Amazon CloudFront using AWS Lambda@Edge - I have a website (No one knows static or dynamic. But they are using EC2). In order do this, I will have to use CloudFront with Lambda@Edge + EC2 + S3. Wah. Technically can. But why? D. Application Load Balancer using HTTPS listeners and targets - In my web application (Deployed at EC2 with IAM Role 'xxx'), I will use AWS SDK in my code and as soon as data hits I will encrypt with KMS. I can also ensure that the IAM role attached with EC2 won't have decrypt permission. For this requirement: “A single service within the production VPC must decrypt the PII by leveraging an IAM role.” - There is NO solution in the answer.
upvoted 1 times
...
StelSen
3 years, 7 months ago
Everyone agreed to E. So, let's look at B or D B. Amazon CloudFront using AWS Lambda@Edge - I have a website (No one knows static or dynamic. But they are using EC2). In order do this, I will have to use CloudFront with Lambda@Edge + EC2 + S3. Wah. Technically can. But why? D. Application Load Balancer using HTTPS listeners and targets - In my web application (Deployed at EC2 with IAM Role 'xxx'), I will use AWS SDK in my code and as soon as data hits I will encrypt with KMS. I can also ensure that the IAM role attached with EC2 won't have decrypt permission. For this requirement: “A single service within the production VPC must decrypt the PII by leveraging an IAM role.” - There is NO solution in the answer. But atleast I won't select Lamda@Edge as its not running in my production VPC.
upvoted 1 times
...
AshishBravo
3 years, 7 months ago
BE 1. Use the field-level encryption feature offered by CloudFront. 2. KMS to encrypt/decrypt https://aws.amazon.com/blogs/networking-and-content-delivery/serving-sse-kms-encrypted-content-from-s3-using-cloudfront/ https://aws.amazon.com/blogs/security/how-to-enhance-the-security-of-sensitive-customer-data-by-using-amazon-cloudfront-field-level-encryption/ Though LambdaEdge would also required but the Best & nearest answer is B&E.
upvoted 1 times
...
NSF2
3 years, 7 months ago
The answers are C and E Consider below embedded statement; “specifically encrypted at all times and as soon as feasible when received” This implies that some kind of encryption mechanism when data is at rest. So for that C ( MySQL TDE) is most appropriate. Then there is a question of how we encrypt it, the catch phrase here is “IAM” which is E.
upvoted 1 times
...
ChauPhan
3 years, 7 months ago
B. Amazon CloudFront using AWS Lambda@Edge E. AWS Key Management Services
upvoted 1 times
...
NSF2
3 years, 7 months ago
After reading the information on below link, it is crystal clear that the answer is BE https://aws.amazon.com/blogs/security/how-to-protect-sensitive-data-for-its-entire-lifecycle-in-aws/
upvoted 8 times
sapien45
3 years, 2 months ago
Irefutable argument, an aws blog link is better than hundreds lines of babling BE
upvoted 1 times
...
ChinkSantana
3 years, 7 months ago
Nice Read, THnaks
upvoted 1 times
...
...
CloudArchitect
3 years, 7 months ago
Answer is B and E for me.
upvoted 1 times
...
ImAlwaysRight
3 years, 7 months ago
Clearly A is one of the answers, but not sure about the other one... B is not necessary because Lambda ENI may access SQS service via IGW or VPC Service Endpoint for SQS. C is also not necessary because we may use NAT Gateway/Instance or again VPC Service Endpoint for SQS. D may be true, as ElasticCache cluster's SG must allow outbound access to the Lambda ENI. I would go for AD then... Still the only 100% right answer for me is A though.
upvoted 1 times
learnwithaniket
3 years, 6 months ago
https://aws.amazon.com/blogs/security/how-to-protect-sensitive-data-for-its-entire-lifecycle-in-aws/ Please read this
upvoted 1 times
...
...
Johnny_Green
3 years, 7 months ago
If one takes a look at the "Sample application architecture and data flow" diagram given in https://aws.amazon.com/blogs/security/how-to-enhance-the-security-of-sensitive-customer-data-by-using-amazon-cloudfront-field-level-encryption/, it becomes clear that Amazon CloudFront is where the encryption should take place as it satisfies the requirement of "...personally identifiable information (PII) elements are specifically encrypted at all times and as soon as feasible when received". While database could be part of the architecture (as it is shown in the same diagram), it comes after.
upvoted 4 times
Johnny_Green
3 years, 7 months ago
Therefore, B, E are correct answers.
upvoted 8 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...