exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 239 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 239
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company has two software development teams that are creating applications that store sensitive data in Amazon S3. Each team's data must always be separate. The company's security team must design a data encryption strategy for both teams that provides the ability to audit key usage. The solution must also minimize operational overhead.
What should the security team recommend?

  • A. Tell the application teams to use two different S3 buckets with separate AWS Key Management Service (AWS KMS) AWS managed CMKs. Limit the key policies to allow encryption and decryption of the CMKs to their respective teams only. Force the teams to use encryption context to encrypt and decrypt.
  • B. Tell the application teams to use two different S3 buckets with a single AWS Key Management Service (AWS KMS) AWS managed CMK. Limit the key policy to allow encryption and decryption of the CMK only. Do not allow the teams to use encryption context to encrypt and decrypt.
  • C. Tell the application teams to use two different S3 buckets with separate AWS Key Management Service (AWS KMS) customer managed CMKs. Limit the key policies to allow encryption and decryption of the CMKs to their respective teams only. Force the teams to use encryption context to encrypt and decrypt.
  • D. Tell the application teams to use two different S3 buckets with a single AWS Key Management Service (AWS KMS) customer managed CMK. Limit the key policy to allow encryption and decryption of the CMK only. Do not allow the teams to use encryption context to encrypt and decrypt.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hungdv
Highly Voted 3 years, 7 months ago
C is answer. You can not change key policy with option A. Option A: You can view the AWS managed CMKs in your account, view their key policies, and audit their use in AWS CloudTrail logs. However, you cannot manage these CMKs, rotate them, or change their key policies. And, you cannot use AWS managed CMKs in cryptographic operations directly; the service that creates them uses them on your behalf.
upvoted 42 times
...
skipbaylessfor3
Highly Voted 3 years, 7 months ago
I understand that A has less operational overhead. But, the keys are not going to be separate, they are the same. When you select AWS Managed CMKs for S3, it will choose the aws/s3 CMK in your account, of which there is only one. So there is only one key. Further, it says "limit the key policies to allow encryption and decryption of the CMKs to their respective teams only" - how can you do that with an AWS Managed CMK? You can't. Therefore I'm sticking with C. I'm surprised, some names in the comments who I thought usually have trustworthy answers are siding with A, not sure why. Best to do your own research for each question I guess
upvoted 14 times
wahlbergusa
3 years, 7 months ago
+1 on comments regarding comments :) Do your own research to make sure.
upvoted 3 times
...
...
kiwi123
Most Recent 1 year, 9 months ago
Selected Answer: B
I think B suffices the requirement, cause "data must always be separate" doesnt mean key should be separated?
upvoted 1 times
...
gsax
1 year, 9 months ago
Selected Answer: A
A - the solution must also minimize operational overhead which it does with AWS managed CMKs. That's the only diff between A & C.
upvoted 1 times
...
gsax
1 year, 9 months ago
A - the solution must also minimize operational overhead which it does with AWS managed CMKs. That's the only diff between A & C.
upvoted 1 times
...
samCarson
1 year, 11 months ago
Selected Answer: A
A. Tell the application teams to use two different S3 buckets with separate AWS Key Management Service (AWS KMS) AWS managed CMKs. Limit the key policies to allow encryption and decryption of the CMKs to their respective teams only. Force the teams to use encryption context to encrypt and decrypt. The security team should recommend using separate S3 buckets for each team with distinct AWS managed CMKs. This approach ensures data segregation and allows for fine-grained access control by limiting encryption and decryption permissions to the respective teams. By enforcing the use of encryption context during encryption and decryption operations, auditability of key usage can be achieved. This solution minimizes operational overhead while meeting the requirement of keeping the teams' data separate and auditable. Option C introduces the use of customer managed CMKs, which may increase operational overhead, as the security team would need to manage and rotate the CMKs for each team.
upvoted 1 times
...
pal40sg
2 years ago
Selected Answer: A
option A: Tell the application teams to use two different S3 buckets with separate AWS Key Management Service (AWS KMS) AWS managed customer master keys (CMKs). Limit the key policies to allow encryption and decryption of the CMKs to their respective teams only. Force the teams to use encryption context to encrypt and decrypt.
upvoted 1 times
pal40sg
2 years ago
Option B, which suggests using a single AWS managed CMK for both teams, does not satisfy the requirement Option C suggests using separate customer managed CMKs, introduces additional operational overhead Option D, similar to option B, does not provide data separation between the teams
upvoted 1 times
...
...
ITGURU51
2 years, 1 month ago
The best way to audit the key is to create a single key for each group. That way we can limit who gets to encrypt and decrypt the data. The question is testing your ability to follow the principal of least privilege. C
upvoted 1 times
...
kvirk
2 years, 2 months ago
Selected Answer: A
This approach ensures that the data of both teams is always separate, as each team has its own S3 bucket and CMK. Additionally, the key policies can be limited to only allow encryption and decryption of the CMKs to their respective teams, ensuring that the data cannot be accessed by the wrong team. Enforcing the use of encryption context ensures that the teams are using the keys correctly and helps prevent unauthorized access. Finally, using AWS managed CMKs instead of customer managed CMKs minimizes operational overhead, as AWS automatically manages the key rotation and other maintenance tasks. Option B is not recommended as it does not ensure that the data of both teams is always separate. Option C is a good alternative, but using AWS managed CMKs is preferable to minimize operational overhead. Option D is not recommended as it does not enforce the use of encryption context, which is important for security.
upvoted 1 times
gerches
2 years ago
you cannot edit key polilcies of an aws managed key
upvoted 1 times
...
...
boooliyooo
2 years, 4 months ago
Selected Answer: C
Firstly, using AWS managed CMKs may not provide as much control over the key as using customer managed CMKs, as it is managed by AWS and not the security team. Secondly, while using encryption context is a good practice to ensure proper encryption and decryption of the data and to track key usage, it adds an additional layer of complexity to the process, which may increase the operational overhead. In some cases, the added complexity may be unnecessary and the security team could use other security controls to achieve the same level of security. Finally, while separating the data in different S3 bucket is a good practice, it may not be enough to separate the teams data, as the encryption key is shared among all the data in the bucket. So, even though the data is separate, the key is not. For those reasons, option C is the more optimal choice for this scenario.
upvoted 1 times
...
sapien45
2 years, 9 months ago
Selected Answer: C
* Each team's data must always be separate : two keys * Sensitive data : two keys * limit the key policies to allow encryption and decryption of the CMKs to their respective teams only : only doable with Customer CMKs
upvoted 2 times
...
xaocho
2 years, 10 months ago
Selected Answer: C
I think C, agree with @skipbaylessfor3
upvoted 2 times
...
lotfi50
2 years, 12 months ago
Selected Answer: C
Answer is C
upvoted 2 times
...
jackfei
3 years ago
C. different S3 buckets with separate AWS Key Management Service (AWS KMS)
upvoted 1 times
...
TigerInTheCloud
3 years, 1 month ago
Selected Answer: B
Let AWS manage the key to "reduce operating costs"; and with separate S3, there is no need of having the complexity (an operating cost) of using encryption context.
upvoted 3 times
...
MoreOps
3 years, 2 months ago
Selected Answer: C
I think C makes the most sense, i would want to have more control over the key , so its customer managed.
upvoted 2 times
...
Radhaghosh
3 years, 4 months ago
limit the key policies to allow encryption and decryption of the CMKs to their respective teams only --> 2 separate Keys --> Customer Managed Key and 2 separate S3 buckets Answer is C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...