exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 246 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 246
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A large government organization is moving to the cloud and has specific encryption requirements. The first workload to move requires that a customer's data be immediately destroyed when the customer makes that request.
Management has asked the security team to provide a solution that will securely store the data, allow only authorized applications to perform encryption and decryption, and allow for immediate destruction of the data.
Which solution will meet these requirements?

  • A. Use AWS Secrets Manager and an AWS SDK to create a unique secret for the customer-specific data.
  • B. Use AWS Key Management Service (AWS KMS) and the AWS Encryption SDK to generate and store a data encryption key for each customer.
  • C. Use AWS Key Management Service (AWS KMS) with service-managed keys to generate and store customer-specific data encryption keys.
  • D. Use AWS Key Management Service (AWS KMS) and create an AWS CloudHSM custom key store. Use CloudHSM to generate and store a new CMK for each customer.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Fazzy
Highly Voted 3 years, 9 months ago
D is the answer Q: Why would I need to use a custom key store? A: Since you control your AWS CloudHSM cluster, you have the option to manage the lifecycle of your CMKs independently of AWS KMS. There are four reasons why you might find a custom key store useful. Firstly, you might have keys that are explicitly required to be protected in a single tenant HSM or in an HSM over which you have direct control. Secondly, you might have keys that are required to be stored in an HSM that has been validated to FIPS 140-2 level 3 overall (the HSMs used in the standard AWS KMS key store are either validated or in the process of being validated to level 2 with level 3 in multiple categories). Thirdly, you might need the ability to immediately remove key material from AWS KMS and to prove you have done so by independent means. Finally, you might have a requirement to be able to audit all use of your keys independently of AWS KMS or AWS CloudTrail. https://aws.amazon.com/kms/faqs/
upvoted 27 times
khchan123
3 years, 8 months ago
Yes, D. You need AWS KMS customer master key in order to achieve immediate removal.
upvoted 3 times
DahMac
3 years, 8 months ago
The DATA has to be immediately destroyed, not the keys. But I am also going with D.
upvoted 3 times
...
...
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: D
D is the correct answer. KMS + custom key store in CloudHSM.
upvoted 1 times
...
kpv_
1 year, 7 months ago
A is the answer. CloudHSM only supports S3 and DynamoDB, also custom key store is for storing encrypted keys and they mentioned just data.
upvoted 1 times
...
sprial02
1 year, 11 months ago
Because "allow only authorized applications to perform encryption and decryption " is answer A How implement "allow only authorized applications?" only SDK do it.
upvoted 2 times
...
samCarson
2 years ago
Selected Answer: D
D. Use AWS Key Management Service (AWS KMS) and create an AWS CloudHSM custom key store. Use CloudHSM to generate and store a new CMK for each customer. Option D is the best answer because it combines the secure key storage and cryptographic operations provided by AWS CloudHSM with the key management capabilities of AWS KMS. This allows for the generation and storage of customer-specific CMKs, ensuring secure storage of data and control over encryption and decryption operations. Additionally, the ability to revoke or delete CMKs in AWS KMS provides a mechanism for immediate destruction of customer data when requested. Option B (AWS KMS with service-managed keys) may not provide the required granularity and flexibility for generating and storing customer-specific keys and ensuring immediate destruction when requested.
upvoted 1 times
...
boooliyooo
2 years, 5 months ago
Selected Answer: D
the question did not specifically state that a high level of security is required, however, the requirement to immediately destroy data when a customer requests it, suggests that the data is sensitive and requires a secure storage solution. In such case, AWS CloudHSM is a service that provides a high level of security for storing and managing encryption keys, which is well suited for this use case. It allows for the creation of a custom key store for each customer and ensures that only authorized applications can access the customer's data and that the data can be immediately destroyed when the customer requests it. Option D, using AWS KMS and creating an AWS CloudHSM custom key store, is a suitable solution that would meet the requirements of the question.
upvoted 1 times
...
sapien45
2 years, 10 months ago
Selected Answer: D
Why would I need to use a custom key store? ---you might need the ability to immediately remove key material from AWS KMS and to prove you have done so by independent means
upvoted 1 times
...
sapien45
2 years, 10 months ago
Selected Answer: D
I also have a problem with quick data deletion" instead of of "quick key deletion", but I will go for D
upvoted 1 times
...
dcasabona
2 years, 11 months ago
Selected Answer: D
I would go for D.
upvoted 1 times
...
Omijh
2 years, 11 months ago
Selected Answer: B
``` When to use AWS CloudHSM When Do I Use Something Else? If you need to secure your encryption keys in a service backed by FIPS-validated HSMs, but you do not need to manage the HSM ``` src: https://docs.aws.amazon.com/crypto/latest/userguide/awscryp-choose-hsm.html The question doesn't mention FIPS or HSM requirements. ``` A default implementation that adheres to cryptography best practices By default, the AWS Encryption SDK generates a unique data key for each data object that it encrypts. This follows the cryptography best practice of using unique data keys for each encryption operation. ``` src: https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html encryption SDK generates secure data keys
upvoted 3 times
...
TigerInTheCloud
3 years, 2 months ago
Selected Answer: D
B is not a wrong answer. However, D is a more stringent encryption approach. Could "quick data deletion" is the typo of "quick key deletion"?
upvoted 1 times
...
lotfi50
3 years, 5 months ago
Selected Answer: D
D is the answer
upvoted 1 times
...
RamKun
3 years, 6 months ago
B https://docs.aws.amazon.com/crypto/latest/userguide/awscryp-choose-sdk.html
upvoted 1 times
...
1awssec
3 years, 8 months ago
D >> https://aws.amazon.com/kms/faqs/#Custom_Key_Store
upvoted 2 times
...
hk436
3 years, 8 months ago
D is my answer.!
upvoted 2 times
...
Syeda123
3 years, 8 months ago
Is this one B or D?
upvoted 2 times
...
Ponzy
3 years, 9 months ago
Dis the answer: My rationale for this is that the keyword is Government, remember FIPS 140-2/3 compliancy. Answer D is the one that speaks about HSM. I suspect joining these dots makes the answer so obvious. I would go with D.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...