exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 119 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 119
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company plans to migrate a sensitive dataset to Amazon S3. A Security Engineer must ensure that the data is encrypted at rest. The encryption solution must enable the company to generate its own keys without needing to manage key storage or the encryption process.
What should the Security Engineer use to accomplish this?

  • A. Server-side encryption with Amazon S3-managed keys (SSE-S3)
  • B. Server-side encryption with AWS KMS-managed keys (SSE-KMS)
  • C. Server-side encryption with customer-provided keys (SSE-C)
  • D. Client-side encryption with an AWS KMS-managed CMK
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hungdv
Highly Voted 3 years, 6 months ago
B is answer
upvoted 10 times
JohnnieWalker
3 years, 3 months ago
Wooww, most people think the answer for this one is B "KMS-managed" ? There is even a comment "can I have this in my exam" hahaha. I am pretty sure the answer is C. AWS recommends to use customer-managed keys, it is a best practice to create your own KMS keys. There are many limitation to the kms-managed keys and it is always a better option to use customer-managed keys. As per the question requirements business can create its own customer-managed keys and do not require management of key storage or encryption, AWS does it all for customer-managed keys, plus you have the flexibility to use the key on any services, intead of kms-managed keys that are created specifically for a service. https://docs.aws.amazon.com/whitepapers/latest/kms-best-practices/aws-managed-and-customer-managed-cmks.html
upvoted 8 times
JohnnieWalker
3 years, 3 months ago
Opsss, I was making a big mistake. For a minute I went back to the question and I noticed the the option C is talking about customer-provided keys (SSE-C) and not “KMS customer-managed keys”, so I read the word “customer” and did not pay attention to the rest hehehe. So, yes the answer is B. They must use KMS, which is basically the only option B.
upvoted 6 times
RajAWSDevOps007
4 months ago
crazily fast in your reading but glad you were able to finally get it ;-)
upvoted 1 times
...
...
...
...
Raphaello
Most Recent 1 year, 2 months ago
Selected Answer: B
Let look at the constraints and what fulfill them: company to generate its own keys: SSE-KMS & SSE-C both fulfill this. without needing to manage encryption process: SSE-KMS & SSE-C both fulfill this. without needing to manage key storage: Only SSE-KM fulfills this. Correct answer is B.
upvoted 2 times
virtual
5 months ago
Good explanation step by step :-) Thanks
upvoted 1 times
...
...
Nuha_23
1 year, 8 months ago
Selected Answer: B
C is not correct because with SSE-C you need to manage the encryption keys that you provide
upvoted 1 times
...
ITGURU51
1 year, 11 months ago
With SSE-S3, Amazon S3 manages the encryption keys and encrypts all data stored in your bucket with a unique key. With SSE-KMS, you maintain control over the encryption keys and can rotate them periodically for enhanced security. B
upvoted 1 times
...
Dmosh
2 years ago
Selected Answer: B
With C you need to manage storage.
upvoted 1 times
...
boooliyooo
2 years, 3 months ago
Selected Answer: C
To ensure that the sensitive data is encrypted at rest in Amazon S3 and enable the company to generate its own keys without needing to manage key storage or the encryption process, the security engineer should use server-side encryption with customer-provided keys (SSE-C). With SSE-C, the security engineer can provide their own keys, which are used to encrypt and decrypt the data as it is written to and read from Amazon S3. The keys are stored and managed by the company, rather than being managed by Amazon S3 or AWS KMS. This allows the company to have full control over the key management process and ensure that the keys are stored in a secure manner.
upvoted 1 times
MrTricky
2 years, 3 months ago
As your comment says, with SSE-C: "The keys are stored and managed by the company" which does NOT satisfy the conditions in the question, since it is said that the keys should not be stored by the company. So the answer is B, SSE-KMS with CMK, even if it is not explicitly stated.
upvoted 2 times
ASC1
1 year, 10 months ago
so for SSE C the customer creates, customer provides key material, customer stores and customer manages the key which is NOT the requirement in the question? as per the question they do not want to manage key storage or encryption process and sothe answer is C. with SSE KMS I think the service generates its own key....and NOT the company rt? Sorry anyone can clarify this please.
upvoted 1 times
...
...
...
knc
2 years, 6 months ago
Selected Answer: B
B- Customer Managed C- Customer Provided The question is talking about customer managed hence B is the correct answer.
upvoted 2 times
...
Root_Access
2 years, 7 months ago
Selected Answer: B
Its B, although C seems very tempting. explanation for B (when you want to CREATE the key not necessarily providing your own key) If you use KMS keys, you can use AWS KMS through the AWS Management Console or the AWS KMS APIs to do the following: Centrally create KMS keys Define the policies that control how KMS keys can be used Audit their usage to prove that they are being used correctly explanation for C (used when you want to provide your own key) Server-side encryption is about protecting data at rest. Using server-side encryption with customer-provided encryption keys (SSE-C) allows you to set your own encryption keys. With the encryption key you provide as part of your request, Amazon S3 manages the encryption as it writes to disks and decryption when you access your objects. Therefore, you don't need to maintain any code to perform data encryption and decryption. The only thing you do is manage the encryption keys you provide. https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerSideEncryptionCustomerKeys.html
upvoted 3 times
...
tblazeen
2 years, 7 months ago
Selected Answer: B
B is very correct!
upvoted 2 times
...
vbal
2 years, 8 months ago
B is absolutely correct, C is wrong because it requires storing and managing the Key by Clients: "When you use server-side encryption with AWS KMS (SSE-KMS), you can use the default AWS managed key, or you can specify a customer managed key that you have already created."
upvoted 2 times
...
dcasabona
2 years, 8 months ago
Selected Answer: C
I go for option C as well.
upvoted 1 times
...
sam_live
3 years, 3 months ago
The correct answer to this question would be SSE-KMS Customer Managed Key. But none of the option provides that. it's difficult to understand why would it be option "C" as question requires without managing the keys.
upvoted 1 times
...
acloudguru
3 years, 5 months ago
CAN I HAVE THIS IN MY EXAM?
upvoted 2 times
...
HananS
3 years, 5 months ago
https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys B
upvoted 2 times
...
TollaMS
3 years, 6 months ago
B is the answer C is out because You manage a mapping of which encryption key was used to encrypt which object. Amazon S3 does not store encryption keys. You are responsible for tracking which encryption key you provided for which object.
upvoted 4 times
...
Daniel76
3 years, 6 months ago
Answer B. Requirement: "..company to generate its own keys without needing to manage key storage or the encryption process."" SSE-KMS does use CMK, which fulfil "company generate its own keys". SSE-C is out because: https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerSideEncryptionCustomerKeys.html "You manage a mapping of which encryption key was used to encrypt which object. Amazon S3 does not store encryption keys. You are responsible for tracking which encryption key you provided for which object."
upvoted 4 times
...
[Removed]
3 years, 6 months ago
c https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerSideEncryptionCustomerKeys.html
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago