exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 213 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 213
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company's data lake uses Amazon S3 and Amazon Athena. The company's security engineer has been asked to design an encryption solution that meets the company's data protection requirements. The encryption solution must work with Amazon S3 and keys managed by the company. The encryption solution must be protected in a hardware security module that is validated to Federal Information Processing Standards (FIPS) 140-2 Level 3.
Which solution meets these requirements?

  • A. Use client-side encryption with an AWS KMS customer-managed key implemented with the AWS Encryption SDK.
  • B. Use AWS CloudHSM to store the keys and perform cryptographic operations. Save the encrypted text in Amazon S3.
  • C. Use an AWS KMS customer-managed key that is backed by a custom key store using AWS CloudHSM.
  • D. Use an AWS KMS customer-managed key with the bring your own key (BYOK) feature to import a key stored in AWS CloudHSM.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sanjaym
Highly Voted 3 years, 8 months ago
Answer: C You can configure AWS Key Management Service (KMS) to use your AWS CloudHSM cluster as a custom key store rather than the default KMS key store. With a KMS custom key store you benefit from the integration between KMS and AWS services that encrypt data while retaining control of the HSMs that protect your KMS master keys. KMS custom key store gives you the best of both worlds, combining single-tenant HSMs under your control with the ease of use and integration of AWS KMS. https://aws.amazon.com/cloudhsm/
upvoted 19 times
sanjaym
3 years, 8 months ago
And this is what I found on AWS KMS console. that support my reasoning. You can store your KMS customer master keys (CMKs) in a custom key store instead of the standard KMS key store. Custom key stores are created using an AWS CloudHSM cluster that you own and manage. This provides direct control of the hardware security modules (HSMs) that generate the key material for your CMKs and perform cryptographic operations with them. Learn more To get started with custom key stores you first need to create a AWS CloudHSM cluster.
upvoted 4 times
...
...
Raphaello
Most Recent 1 year, 3 months ago
Selected Answer: C
Correct answer is C.
upvoted 1 times
...
samCarson
2 years ago
Selected Answer: C
This option combines the use of AWS KMS customer-managed keys with a custom key store backed by AWS CloudHSM. It provides the required FIPS 140-2 Level 3 validation by utilizing the HSM capabilities of CloudHSM. The custom key store acts as a hardware security module that securely stores and manages the encryption keys.
upvoted 1 times
...
pal40sg
2 years ago
Selected Answer: C
C. Use an AWS KMS customer-managed key that is backed by a custom key store using AWS CloudHSM.
upvoted 1 times
...
mgonblan
2 years, 1 month ago
I think it's A because AWS KMS Currently supports FIPS-140-2 Level 3. https://aws.amazon.com/es/blogs/security/aws-key-management-service-now-offers-fips-140-2-validated-cryptographic-modules-enabling-easier-adoption-of-the-service-for-regulated-workloads/
upvoted 1 times
...
ITGURU51
2 years, 1 month ago
A custom key store is a logical key store within AWS KMS that is backed by a key manager outside of AWS KMS that you own and manage. Custom key stores combine the convenient and comprehensive key management interface of AWS KMS with the ability to own and control the key material and cryptographic operations. When you use a KMS key in a custom key store, the cryptographic operations are performed by your key manager using your cryptographic keys. As a result, you assume more responsibility for the availability and durability of cryptographic keys, and for the operation of the HSMs. Answer C is the most secure and flexible.
upvoted 1 times
...
lotfi50
3 years ago
Selected Answer: C
Answer C
upvoted 1 times
...
ggx
3 years, 4 months ago
What about D? customer managed KMS with BYOK = Importoted key materials backed by HSM
upvoted 2 times
CW0106
2 years, 10 months ago
why not D? https://aws.amazon.com/cn/blogs/security/how-to-byok-bring-your-own-key-to-aws-kms-for-less-than-15-00-a-year-using-aws-cloudhsm/
upvoted 1 times
...
samCarson
2 years ago
Option D involves importing a key stored in AWS CloudHSM, which satisfies the FIPS 140-2 Level 3 requirement. However, it doesn't explicitly mention the use of a "custom key store", which provides a secure integration between AWS KMS and CloudHSM.
upvoted 1 times
...
...
BeCalmAndSmile
3 years, 5 months ago
Though I like the rationale of Answer B, however, for S3+Athena solution, this will make it very expensive data lake solution and I am siding with C which is more aligned to the best practice.
upvoted 1 times
...
1awssec
3 years, 7 months ago
C (key: "custom key store") https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html
upvoted 2 times
...
kiev
3 years, 7 months ago
C and the key word is that the key must be stored by a hardware security module#HSM
upvoted 4 times
...
EricR17
3 years, 7 months ago
If the answer is expected to be C then this is a misleading question. The statement "the encryption solution must be protected in hardware" implies that the crypto is done within the bounds of an HSM. Using S3 backed by KMS - even with CloudHSM - won't do this, as S3 does the encryption directly with a DEK (it's not using the HSM to encrypt/decrypt the data). I deal with this weekly in my line of work, and an S3-like solution does not meet the requirement of ensuring both keys and crypto are always managed by an HSM. Rather, you have to interface directly with the HSM to do the encryption and then store the encrypted text at rest (S3 in this case). That would more closely align with answer B.
upvoted 2 times
...
nparimi
3 years, 8 months ago
Ans C since we want to use S3 that works only with KMS and can not work directly with HSM, use aws-key-management-service-kms-custom-key-store 1. S3 - AWS Key Management Service key (SSE-KMS) 2. Choose from your AWS KMS keys 3. Key material origin 4. Custom key store (CloudHSM) https://aws.amazon.com/about-aws/whats-new/2018/11/announcing-aws-key-management-service-kms-custom-key-store/
upvoted 4 times
...
continent34
3 years, 8 months ago
CloudHSM provides FIPS 140-2 Level 3 validated HSMs.
upvoted 3 times
...
continent34
3 years, 8 months ago
AWS KMS HSMs are validated at level 2 overall and at level 3 in the following areas: Cryptographic Module Specification Roles, Services, and Authentication Physical Security Design Assurance https://aws.amazon.com/blogs/security/aws-key-management-service-now-offers-fips-140-2-validated-cryptographic-modules-enabling-easier-adoption-of-the-service-for-regulated-workloads/#:~:text=AWS%20Key%20Management%20Service%20(KMS,and%20integrity%20of%20your%20keys.
upvoted 1 times
TollaMS
3 years, 7 months ago
So the answer is clear C
upvoted 1 times
...
...
AlexWong
3 years, 8 months ago
This question is the same as question 189.
upvoted 1 times
...
GCP_user
3 years, 8 months ago
C. Use an AWS KMS customer-managed key that is backed by a custom key store using AWS CloudHSM. B is incorrect since saving keys in S3 makes no sense.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...