exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 98 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 98
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A Development team has asked for help configuring the IAM roles and policies in a new AWS account. The team using the account expects to have hundreds of master keys and therefore does not want to manage access control for customer master keys (CMKs).
Which of the following will allow the team to manage AWS KMS permissions in IAM without the complexity of editing individual key policies?

  • A. The account's CMK key policy must allow the account's IAM roles to perform KMS EnableKey.
  • B. Newly created CMKs must have a key policy that allows the root principal to perform all actions.
  • C. Newly created CMKs must allow the root principal to perform the kms CreateGrant API operation.
  • D. Newly created CMKs must mirror the IAM policy of the KMS key administrator.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
eviecat
Highly Voted 3 years, 9 months ago
GUYS, PLEASE READ THIS Keyword is "Which of the following will allow the team to manage AWS KMS permissions in IAM" This is option B. If you specify the root user in a KMS key policy, it enables any IAM user/role in the account to access the key as long as they have attached IAM permissions that allow it. Thus, access is controlled with the IAM permissions. This is a super common use case, you do not want to be editing the key policy or creating grants all the time, it is much easier to control everything in IAM
upvoted 36 times
sapien45
2 years, 11 months ago
Makes sense, I second that
upvoted 2 times
...
Dmosh
2 years, 4 months ago
to fix, it's the root principal and the same as specifying principal account id- "AWS: 12345678910"
upvoted 1 times
...
...
INASR
Highly Voted 3 years, 11 months ago
i think it is B since when you create a CMK , it must have root principal to have full access to kms and allow the usage of IAM policies to provide access to everyone else in the account . However i am not sure .
upvoted 30 times
anonymous654
3 years, 10 months ago
Answer is B. You are right. Question is indirectly asking for this exact point.
upvoted 5 times
...
...
anhtu133
Most Recent 1 year, 8 months ago
https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html It's the first policy statement in the default key policy for KMS keys created in the AWS KMS console. { "Sid": "Enable IAM User Permissions", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::111122223333:root" }, "Action": "kms:*", "Resource": "*" } When the principal in a key policy statement is the account principal, the policy statement doesn't give any IAM principal permission to use the KMS key. Instead, it allows the account to use IAM policies to delegate the permissions specified in the policy statement. This default key policy statement allows the account to use IAM policies to delegate permission for all actions (kms:*) on the KMS key.
upvoted 1 times
anhtu133
1 year, 8 months ago
Ans is B
upvoted 1 times
...
...
ITGURU51
2 years, 2 months ago
Key policies are the primary way to control access to CMKs in AWS KMS. Each CMK has a key policy attached to it that defines permissions on the use and management of the key. The default policy enables any principals you define, as well as enables the root user in the account to add IAM policies that reference the key. B
upvoted 1 times
...
matrpro
2 years, 3 months ago
Selected Answer: B
If you specify the root user in a KMS key policy, it enables any IAM user/role in the account to access the key as long as they have attached IAM permissions that allow it.
upvoted 1 times
...
Nikhil0222
2 years, 4 months ago
The answer is D. Newly created CMKs must mirror the IAM policy of the KMS key administrator. By default, AWS KMS uses key policies to manage access to CMKs. However, managing individual key policies for hundreds of CMKs can be complex and time-consuming. Instead, you can use IAM policies to manage access to CMKs by creating an IAM role that has permission to use KMS and attaching an IAM policy to that role. To simplify the process of managing access to CMKs, you can create an IAM policy that grants the necessary permissions to the IAM role, and then attach that policy to the KMS key administrator's IAM user or role. This way, all newly created CMKs will automatically inherit the same permissions as the KMS key administrator.
upvoted 1 times
...
Sai123
2 years, 4 months ago
C is correct answer. Checked in chatgpt too.
upvoted 2 times
...
bbhatt
2 years, 7 months ago
without the complexity of editing individual key policies why you want to add extra burden on root user by selecting option B? There are two types of users, key administrators and key users. Key admins can do the task instead on root user.
upvoted 2 times
...
boooliyooo
2 years, 7 months ago
Selected Answer: D
I'm challenging this answer as D. Since managing of access does not require anyone to have ALL access. You only require the key administrator privileges. As supported by the official study guide pg. 227 "Key Administrators: IAM users or IAM roles that can manage the keys"
upvoted 1 times
...
lotfi50
3 years, 2 months ago
Selected Answer: B
B is correct
upvoted 2 times
...
kiev
3 years, 9 months ago
B for me as well because root would simply be able to do every action and the rests would not have to do anything.
upvoted 2 times
...
tailedman
3 years, 9 months ago
B 100%
upvoted 2 times
...
Larsson
3 years, 9 months ago
I'd say B. The grant is insufficient.
upvoted 2 times
...
Huy
3 years, 9 months ago
With CreateGrant allowed, you have enough permission to control which user/role can encrypt/decrypt data (normally in application code) but not remove or rotate the CMKs. If you provide All action, that means there is a risk an application can remove an CMK that are used by other applications. C is my choice.
upvoted 1 times
...
NANDY666
3 years, 9 months ago
B is Correct
upvoted 2 times
...
GeeBeeEl
3 years, 9 months ago
Looks like answer is C based on https://docs.aws.amazon.com/kms/latest/developerguide/control-access-overview.html You can control access to your KMS CMKs in these ways: Use the key policy – You must use the key policy to control access to a CMK. You can use the key policy alone to control access, which means the full scope of access to the CMK is defined in a single document (the key policy). Use IAM policies in combination with the key policy – You can use IAM policies in combination with the key policy to control access to a CMK. Controlling access this way enables you to manage all of the permissions for your IAM identities in IAM. Use grants in combination with the key policy – You can use grants in combination with the key policy to allow access to a CMK. Controlling access this way enables you to allow access to the CMK in the key policy, and to allow users to delegate their access to others.
upvoted 1 times
...
Ayusef
3 years, 9 months ago
Its D... Its really between B and D. However, if you think on it the root account like B already has master access like Jose said.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...