exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 190 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 190
Topic #: 1
[All AWS Certified Security - Specialty Questions]

An organization has a multi-petabyte workload that it is moving to Amazon S3, but the CISO is concerned about cryptographic wear-out and the blast radius if a key is compromised.
How can the CISO be assured that AWS KMS and Amazon S3 are addressing the concerns? (Choose two.)

  • A. There is no API operation to retrieve an S3 object in its encrypted form.
  • B. Encryption of S3 objects is performed within the secure boundary of the KMS service.
  • C. S3 uses KMS to generate a unique data key for each individual object.
  • D. Using a single master key to encrypt all data includes having a single place to perform audits and usage validation.
  • E. The KMS encryption envelope digitally signs the master key during encryption to prevent cryptographic wear-out.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
EricR17
Highly Voted 3 years, 6 months ago
Answer: A,C. This question is poorly worded. A. Correct. When SSE-KMS is enabled, S3 won't return an object if the user doesn't have permissions to use the CMK to decrypt. If the user does have permissions, they'll get clear-text data back, not encrypted. Limits cryptanalysis necessary for "key wear-out". B. Incorrect since S3 doesn't encrypt/decrypt objects within KMS - only the data-encryption keys. The objects are encrypted/decrypted in S3. C. Correct - limits blast radius. D. Incorrect the data is larger than the very small 4KB limit for data-encryption using a CMK directly. S3 doesn't do this anyway - it creates DEKs for each object (which is why C is applicable for blast-radius). E. Cryptographic wear-out is a loose term that describes a condition where enough data has been encrypted by a key to make cryptanalyis somewhat feasible. Signing a master key would have no effect.
upvoted 22 times
arpgaur
2 years, 4 months ago
A is incorrect because there is an API operation to retrieve an S3 object in its encrypted form, it's called "GetObject" API, and it allows you to retrieve an object and its metadata in its encrypted form.
upvoted 3 times
...
...
cldy
Highly Voted 3 years, 7 months ago
B & C. D wrong as single master key doesn’t encrypt all data. For huge data it’s the data key that encrypts the data.
upvoted 12 times
EricR17
3 years, 7 months ago
S3 doesn't perform encrypt/decrypt of objects within KMS. It does that locally. It uses KMS to generate a data-encrpytion key during encrypt and to unwrap that key during decrypt. B can't be correct.
upvoted 2 times
...
scuzzy2010
3 years, 7 months ago
I agree. The two concerns are : cryptographic wear-out (addressed by C) and the blast radius (addressed by B)
upvoted 2 times
wahlbergusa
3 years, 6 months ago
B is wrong. Shocked that cldy' s comment been voted 10 times. B states "encryption of S3 object". Encryption of the S3 objects are done by S3 not KMS.
upvoted 5 times
dfranco76
3 years, 6 months ago
B & C Please have a look to bellow article: https://advancedweb.hu/encryption-options-for-s3-objects/
upvoted 1 times
...
...
...
ideoignus
3 years, 3 months ago
B is not correct. Encryption is done in S3, not in scope of KMS
upvoted 1 times
...
...
Raphaello
Most Recent 1 year, 2 months ago
Selected Answer: AC
C is correct. I would pick A alongside it as well.
upvoted 1 times
...
ITGURU51
2 years, 1 month ago
Controlling everything from one place is the most simple and efficient way to manage crypto. A KMS (Key Management Server) should audit security-relevant events by detecting and recording the event, the date and time of the event, and the identity or role of the entity initiating the event. Auditing the cryptographic key lifecycle to identify the state transitions of the key. Auditing and monitoring brings transparency in crypto operations in the organization. CD
upvoted 1 times
...
[Removed]
2 years, 5 months ago
B and C, C is obvious, but for B, You are correct that S3 is responsible for encrypting the data that is stored in the service. However, the encryption is performed using keys that are managed by KMS, which is what is meant by the statement that encryption is performed within the secure boundary of the KMS service. When an object is encrypted in S3, it uses a data key provided by KMS to encrypt the data. This means that the keys used for encryption are managed by KMS, which is a secure and controlled environment, and minimizes the risk of key compromise.
upvoted 1 times
...
sapien45
2 years, 8 months ago
Selected Answer: AC
. When you use SSE-KMS to protect your data without an S3 Bucket Key, Amazon S3 uses an individual AWS KMS data key for every object. It makes a call to AWS KMS every time a request is made against a KMS-encrypted object.
upvoted 2 times
...
sapien45
2 years, 9 months ago
Selected Answer: AC
What is cryptographic wear-out? It's the threshold when you've used the same key to encrypt so much data that you should probably switch to a new key before you encrypt any more.
upvoted 3 times
...
ideoignus
3 years, 3 months ago
Selected Answer: AC
Cryptographic wear out needs ability to access encrypted data, A & C
upvoted 5 times
...
YouYouYou
3 years, 4 months ago
A & C are the only possible answers
upvoted 1 times
...
NivNZ
3 years, 6 months ago
B - correct because from link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucket-encryption.html " The objects are encrypted using server-side encryption with either Amazon S3-managed keys (SSE-S3) or AWS KMS keys stored in AWS Key Management Service (AWS KMS) (SSE-KMS)." D - after reading a lot, found this wording finally under this section "S3 Bucket Keys for SSE-KMS" in this link: https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucket-key.html "When you use SSE-KMS to protect your data without an S3 Bucket Key, Amazon S3 uses an individual AWS KMS data key for every object. It makes a call to AWS KMS every time a request is made against a KMS-encrypted object." There is SSE-KMS, SSE-C (customer managed) & SSE-S3 managed encryption methods. Our question is about SSE-KMS, the above line says S3 uses unique data key for individual object.
upvoted 1 times
NivNZ
3 years, 6 months ago
Oops sorry, that's C not D. Answer is B & C
upvoted 1 times
...
...
Elva
3 years, 6 months ago
If we take step back to this poorly writen q / a I would go with A and C.
upvoted 3 times
...
TollaMS
3 years, 6 months ago
who ever say D is please go and study
upvoted 2 times
...
DerekKey
3 years, 7 months ago
A - OK - there is no possibility to access/download an encrypted object without having permissions to key B - wrong - S3 is encrypting not KMS C - OK - if bigger than 4kb D - wrong - 1. it will lead to cryptographic wear-out 2. There is a data key for object >4kb E - wrong - encryption envelope is for data key
upvoted 3 times
...
Ayusef
3 years, 7 months ago
I think Dayquil has a point and C..D.. are the answers. This is a poorly worded question.
upvoted 1 times
scuzzy2010
3 years, 7 months ago
D doesn't address the CISO's two main concerns though - "cryptographic wear-out and the blast radius"
upvoted 1 times
...
...
Hungdv
3 years, 7 months ago
B and C
upvoted 2 times
...
pyro_mann
3 years, 7 months ago
A+C would be the best answer.
upvoted 3 times
...
Hudda
3 years, 7 months ago
C & D final answer friends pls confirm.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...