exam questions

Exam AWS Certified Solutions Architect - Professional SAP-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Professional SAP-C02 exam

Exam AWS Certified Solutions Architect - Professional SAP-C02 topic 1 question 51 discussion

A health insurance company stores personally identifiable information (PII) in an Amazon S3 bucket. The company uses server-side encryption with S3 managed encryption keys (SSE-S3) to encrypt the objects. According to a new requirement, all current and future objects in the S3 bucket must be encrypted by keys that the company’s security team manages. The S3 bucket does not have versioning enabled.

Which solution will meet these requirements?

  • A. In the S3 bucket properties, change the default encryption to SSE-S3 with a customer managed key. Use the AWS CLI to re-upload all objects in the S3 bucket. Set an S3 bucket policy to deny unencrypted PutObject requests.
  • B. In the S3 bucket properties, change the default encryption to server-side encryption with AWS KMS managed encryption keys (SSE-KMS). Set an S3 bucket policy to deny unencrypted PutObject requests. Use the AWS CLI to re-upload all objects in the S3 bucket.
  • C. In the S3 bucket properties, change the default encryption to server-side encryption with AWS KMS managed encryption keys (SSE-KMS). Set an S3 bucket policy to automatically encrypt objects on GetObject and PutObject requests.
  • D. In the S3 bucket properties, change the default encryption to AES-256 with a customer managed key. Attach a policy to deny unencrypted PutObject requests to any entities that access the S3 bucket. Use the AWS CLI to re-upload all objects in the S3 bucket.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
masetromain
Highly Voted 2 years, 5 months ago
Selected Answer: B
https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingKMSEncryption.html So the correct answer is B. In the S3 bucket properties, change the default encryption to server-side encryption with AWS KMS managed encryption keys (SSE-KMS). Set an S3 bucket policy to deny unencrypted PutObject requests. Use the AWS CLI to re-upload all objects in the S3 bucket.
upvoted 42 times
hamimelon
1 year, 9 months ago
Not B. "must be encrypted by keys that the company’s security team manages". This implies the company does not wanna use AWS KMS.
upvoted 5 times
hogtrough
1 year, 4 months ago
This is why they would use Customer-managed keys in AWS KMS. It is absolutely B
upvoted 3 times
...
jpa8300
1 year, 5 months ago
Hamimmelon, the Company's security Team can manage the AWS KMS service, so B is the right answer. All the others are not valid.
upvoted 2 times
...
...
masetromain
2 years, 5 months ago
Option A is not correct because it uses SSE-S3 with a customer-managed key, but it does not specify how the security team will manage the encryption keys. Additionally, it only denies unencrypted PutObject requests but does not specify how the objects will be encrypted. Option C is not correct because it does not specify how the security team will manage the encryption keys and it does not specify how the objects will be encrypted. Option D is not correct because it uses AES-256 with a customer-managed key, but it does not specify how the security team will manage the encryption keys. Additionally, it simply denies unencrypted PutObject requests, but it doesn't specify how the objects will be encrypted.
upvoted 8 times
jpa8300
1 year, 5 months ago
And adding to this in option D they specify uses default AES-256, but KMS also uses the same, so this option just don't make sense.
upvoted 1 times
...
...
Musk
2 years, 5 months ago
What about the requirement of customer managed keys?
upvoted 10 times
...
hobokabobo
2 years, 4 months ago
Completely ignores the task to solve: "all current and future objects in the S3 bucket must be encrypted by keys that the company’s security team manages. "
upvoted 4 times
cherep87
2 years, 3 months ago
Use the AWS CLI to re-upload all objects in the S3 bucket. - https://docs.aws.amazon.com/AmazonS3/latest/userguide/default-bucket-encryption.html Changes to note before enabling default encryption After you enable default encryption for a bucket, the following encryption behavior applies: There is no change to the encryption of the objects that existed in the bucket before default encryption was enabled. When you upload objects after enabling default encryption: If your PUT request headers don't include encryption information, Amazon S3 uses the bucket’s default encryption settings to encrypt the objects.
upvoted 1 times
hobokabobo
2 years, 2 months ago
Task is to replace any AWS Managed keys to ones "that the company’s security team manages" So they tell us to find a solution that does not use AWS Managed Keys.
upvoted 4 times
hogtrough
1 year, 4 months ago
No, the task was to replace SSE-SE keys which have no relation to AWS KMS. "Amazon S3 automatically enables server-side encryption with Amazon S3 managed keys (SSE-S3) for new object uploads. Unless you specify otherwise, buckets use SSE-S3 by default to encrypt objects. However, you can choose to configure buckets to use server-side encryption with AWS Key Management Service (AWS KMS) keys (SSE-KMS) instead. " https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingKMSEncryption.html
upvoted 1 times
...
...
...
...
...
Untamables
Highly Voted 2 years, 5 months ago
Selected Answer: D
I think D is correct. https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerSideEncryptionCustomerKeys.html
upvoted 21 times
djeong95
1 year, 4 months ago
The issue with D is that it doesn't make it clear where the encryption is happening like all the other options do. Is it server-side (we assume that it is, but it is not what is written)? Or is it client-side?
upvoted 1 times
...
...
Curious76
Most Recent 1 month, 1 week ago
Selected Answer: A
A. In the S3 bucket properties, change the default encryption to SSE-S3 with a customer managed key. Use the AWS CLI to re-upload all objects in the S3 bucket. Set an S3 bucket policy to deny unencrypted PutObject requests. Here's why: Requirements Recap: All current and future objects must be encrypted using customer-managed keys. The current encryption is SSE-S3, which uses S3-managed keys, not customer-managed keys. The bucket does not have versioning enabled, so overwriting (re-uploading) is necessary to change encryption on existing objects.
upvoted 1 times
...
amministrazione
10 months ago
B. In the S3 bucket properties, change the default encryption to server-side encryption with AWS KMS managed encryption keys (SSE-KMS). Set an S3 bucket policy to deny unencrypted PutObject requests. Use the AWS CLI to re-upload all objects in the S3 bucket.
upvoted 1 times
...
Jason666888
10 months, 4 weeks ago
Selected Answer: B
AWS KMS (Key Management Service) allows for customer-managed keys (CMKs), which can indeed be considered as "keys that the company’s security team manages"
upvoted 1 times
...
Helpnosense
1 year ago
Selected Answer: B
In s3 option there is no option to select AES256 custom key.
upvoted 1 times
...
higashikumi
1 year, 1 month ago
Selected Answer: B
To meet the requirement for encrypting all current and future objects in an Amazon S3 bucket with keys managed by the company’s security team, change the S3 bucket’s default encryption to server-side encryption with AWS KMS managed keys (SSE-KMS). Implement an S3 bucket policy to deny unencrypted PutObject requests, ensuring all new uploads are encrypted with the specified KMS key. Then, use the AWS CLI to re-upload all existing objects to the S3 bucket, enforcing the new encryption policy on current data. This approach ensures compliance by applying KMS encryption to both new and existing objects without causing disruptions   .
upvoted 1 times
...
Malcnorth59
1 year, 1 month ago
Selected Answer: B
The solutions need to use SSE-KMS so that the security team can manage the keys, but they also need to ensure that current and future objects are encrypted using customer-managed keys.
upvoted 1 times
...
TonytheTiger
1 year, 1 month ago
Selected Answer: D
Not Option D: " Amazon S3 server-side encryption uses 256-bit Advanced Encryption Standard Galois/Counter Mode (AES-GCM) to encrypt all uploaded objects." AES- 256 is already the default, so you can't change it. https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingServerSideEncryption.html
upvoted 1 times
...
mav3r1ck
1 year, 3 months ago
Selected Answer: B
Correct Approach: This option is accurate and meets all the specified requirements. By changing the default encryption to server-side encryption with AWS KMS managed encryption keys (SSE-KMS), the company can use customer managed keys (CMKs) for encryption. This allows the security team to manage the keys, addressing the core requirement. Setting an S3 bucket policy to deny unencrypted PutObject requests ensures future compliance with the encryption policy. Re-uploading all objects using the AWS CLI ensures that existing objects are encrypted under the new policy, making sure that both current and future objects are encrypted with the keys managed by the company's security team.
upvoted 2 times
...
gofavad926
1 year, 3 months ago
Selected Answer: B
B, option D confuses encryption options. AES-256 is part of the SSE-S3 encryption method and doesn't directly involve customer-managed keys
upvoted 1 times
...
8608f25
1 year, 4 months ago
Selected Answer: B
The solution that meets the requirements for encrypting all current and future objects in the Amazon S3 bucket with keys that the company’s security team manages, while ensuring server-side encryption, is: Option B is correct because it directly addresses the new requirement by changing the default encryption method to SSE-KMS, which allows the use of AWS Key Management Service (KMS) keys managed by the company’s security team. This option ensures that all future uploads are encrypted with the specified KMS key. It also includes re-uploading existing objects to ensure they are encrypted under the new scheme. Setting an S3 bucket policy to deny unencrypted PutObject requests enforces the encryption requirement for all new uploads.
upvoted 1 times
8608f25
1 year, 4 months ago
Option D is incorrect because it refers to “AES-256 with a customer managed key” in a way that mixes concepts. AES-256 is the encryption standard used by SSE-S3 and does not directly apply to the use of customer managed keys. For managing keys, the correct approach is through SSE-KMS, which allows specifying a customer managed AWS KMS key.
upvoted 1 times
...
...
ninomfr64
1 year, 5 months ago
Selected Answer: B
Not A. SSE-S3 with a customer managed key is not an actual option as SSE-S3 uses S3 managed keys Not C. S3 bucket policy cannot automatically encrypt objects on GetObject and PutObject requests. With policies you can only allow/deny actions from specific principals Not D. AES-256 with a customer managed key is not an actual option as AES-256 is used as value for the header x-amz-server-side-encryption to set SSE-S3 on putObject and SSE-S3 uses S3 managed keys B is correct as server-side encryption with AWS KMS managed encryption keys (SSE-KMS) is an actual default encryption settings for S3 bucket and you can use S3 bucket policy to deny unencrypted PutObject. These ensure all new objects will be encrypted with customer managed keys. Then using aws cli to re-upload all object will overwrite existing objects (versioning is not enabled)
upvoted 2 times
...
ismeagain
1 year, 6 months ago
Selected Answer: D
i think D is correct as B is mentioned KMS managed key..
upvoted 1 times
...
Impromptu
1 year, 6 months ago
Selected Answer: B
A - You cannot define your own key B - Correct. Using SSE-KMS and your own KMS customer managed key, you adhere to the requirements C - Does not encrypt existing objects, and you cannot "change" the request to "automatically" encrypt D - You can only choose between SSE-S3 and SSE-KMS (or now DSSE-KMS as well) for default encryption. Underlying the SSE-S3 refers to AES-256 (cfr. "s3:x-amz-server-side-encryption": "AES256") but you cannot specify your customer managed key in that case.
upvoted 1 times
...
_Juwon
1 year, 6 months ago
Selected Answer: B
If use KMS-CMK , wouldn't it be possible to manage keys directly while using KMS? Does anyone have an opinion on this?
upvoted 1 times
...
eurriola10
1 year, 7 months ago
Selected Answer: B
B is correct https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingKMSEncryption.html#aws-managed-customer-managed-keys When you use server-side encryption with AWS KMS (SSE-KMS), you can use the default AWS managed key, or you can specify a customer managed key that you have already created.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...