A financial services company logs personally identifiable information to its application logs stored in Amazon S3. Due to regulatory compliance requirements, the log files must be encrypted at rest. The security team has mandated that the company's on-premises hardware security modules (HSMs) be used to generate the
CMK material.
Which steps should the solutions architect take to meet these requirements?
Nemer
Highly Voted 3 years, 8 months agoEbi
Highly Voted 3 years, 7 months agoet22s
Most Recent 2 years, 6 months agopankajrawat
3 years, 1 month agoAzureDP900
3 years, 6 months agocldy
3 years, 6 months agoAzureDP900
3 years, 6 months agobackfringe
3 years, 6 months agoacloudguru
3 years, 6 months agotgv
3 years, 7 months agoblackgamer
3 years, 7 months agoWhyIronMan
3 years, 7 months agoWaiweng
3 years, 7 months agokopper2019
3 years, 7 months agoT14102020
3 years, 8 months agojackdryan
3 years, 8 months agoCYL
3 years, 8 months ago