Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 22 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 22
Topic #: 1
[All AWS Certified Security - Specialty Questions]

Which option for the use of the AWS Key Management Service (KMS) supports key management best practices that focus on minimizing the potential scope of data exposed by a possible future key compromise?

  • A. Use KMS automatic key rotation to replace the master key, and use this new master key for future encryption operations without re-encrypting previously encrypted data.
  • B. Generate a new Customer Master Key (CMK), re-encrypt all existing data with the new CMK, and use it for all future encryption operations.
  • C. Change the CMK alias every 90 days, and update key-calling applications with the new key alias.
  • D. Change the CMK permissions to ensure that individuals who can provision keys are not the same individuals who can use the keys.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
s3an
Highly Voted 3 years, 1 month ago
A is the best answer I see here: https://aws.amazon.com/kms/faqs/ Q: Do I have to re-encrypt my data after keys in AWS KMS are rotated? If you choose to have AWS KMS automatically rotate keys, you don’t have to re-encrypt your data. AWS KMS automatically keeps previous versions of keys to use for decryption of data encrypted under an old version of a key. All new encryption requests against a key in AWS KMS are encrypted under the newest version of the key. If you manually rotate your imported or custom key store keys, you may have to re-encrypt your data depending on whether you decide to keep old versions of keys available.
upvoted 54 times
matrpro
1 year, 6 months ago
Hello. In my opinion, your point is not 100% valid. It is not needed to re-encrypt but if you do not re-encrypt, you will use the compromised key to decrypt all data. Then, your data is still compromised. I think that B es the best option because even if others have the compromised one, they cannot access to your data
upvoted 4 times
...
binli0114
3 years, 1 month ago
love your answer
upvoted 3 times
...
rocka1
3 years ago
thank you, your answers offers the most valid AWS Documented approach that fits exactly the question.
upvoted 1 times
...
...
AWS56
Highly Voted 3 years, 1 month ago
B- Comment: Automatic key rotation has the following benefits: The properties of the CMK, including its key ID, key ARN, region, policies, and permissions, do not change when the key is rotated. You do not need to change applications or aliases that refer to the CMK ID or ARN. After you enable key rotation, AWS KMS rotates the CMK automatically every year. You don't need to remember or schedule the update. However, automatic key rotation has no effect on the data that the CMK protects. It does not rotate the data keys that the CMK generated or re-encrypt any data protected by the CMK, and it will not mitigate the effect of a compromised data key. You might decide to create a new CMK and use it in place of the original CMK. This has the same effect as rotating the key material in an existing CMK, so it's often thought of as manually rotating the key. Manual rotation is a good choice when you want to control the key rotation schedule. It also provides a way to rotate CMKs with imported key material.
upvoted 12 times
donathon
3 years, 1 month ago
I think you are right but the question ask to "limit" not totally remove. If we want to be 100% sure then we have to rotate the key but re-encrypt everything all over again which is most of the time not feasible. So I support A.
upvoted 1 times
...
swgu
3 years ago
question is about best practice, it cant be any manual task which includes encrypting all data again. it must be A.
upvoted 1 times
not4me
3 years ago
yeah but it says key compromise, wouldn't you want to reencyrpt it with a new key if the key compromise will make the previously encrypted data with stolen keys?
upvoted 2 times
...
udayanverma
3 years ago
Things could be automated by a lambda on cloudtrail event.
upvoted 1 times
...
...
udayanverma
3 years ago
But this would require keeping the old key until re-encrypting the old contents with the new key by copying/uploading them again.
upvoted 1 times
...
Gustava6272
3 years ago
If there was no "future" in question , B would have been right answer .
upvoted 2 times
...
...
shammous
Most Recent 2 weeks, 3 days ago
Selected Answer: B
Option B reduces the exposure of data if the original key is compromised since all previously encrypted data is re-encrypted with a new key. By re-encrypting data with a new CMK, you are essentially limiting the impact of a key compromise to data that was encrypted with the compromised key. Option A only involves rotating the master key for future operations but does not address previously encrypted data. In the event of a key compromise, any data encrypted by the old key would still be at risk.
upvoted 1 times
...
liuyomz
6 months, 3 weeks ago
Selected Answer: A
I think A is better, compared to B.
upvoted 1 times
...
Raphaello
9 months, 1 week ago
Selected Answer: B
This is a tricky question. The focus is on minimizing the potential scope of data exposed by a possible future key compromise. If rotating the key without re-encrypting previous encrypted data, that will NOT minimize the scope of exposed data. In case of compromised key, it is OBLIGATORY to re-encrypt data with a new, or what is the point of rotating the key?! That being said, generating a new key and re-encrypting data with it will be the solution for a compromised key issue to minimize the scope of data exposed. Best answer is B.
upvoted 1 times
...
Aamee
11 months, 3 weeks ago
Selected Answer: B
Must be B so that you don't use the compromised key again for the new data..
upvoted 1 times
...
Tesla_Sky
2 years ago
Correct answer is 'A'. The question asking to find the scope of the data which has been compromised if specific key is compromised. If old or future version of keys are compromised. then we can find which data has been encrypted with the compromised key version. this way we can find out the scope.
upvoted 1 times
...
Tesla_Sky
2 years ago
Correct answer is 'A'. The question asking to find the scope of the data which has been compromised if specific key is compromised. If old or future version of keys are compromised. then we can find which data has been encrypted with the compromised key version. this way we can find out the scope.
upvoted 1 times
...
MoreOps
2 years, 7 months ago
Selected Answer: A
ReRead the question, I misunerstood it at first, key element in the question is that 'what if the key WILL be compromised" I read those who supported A and those who supported B, I think the Answer is A, but at first i mis-read the question and i thought its asking on how to protect data that exists when a key was compromised - if it was compromised when the data exists when the key was compromised. if its for the future - auto rotation works. I vote A after reading
upvoted 1 times
...
lotfi50
2 years, 9 months ago
Selected Answer: A
A is the Answer
upvoted 1 times
...
Radhaghosh
2 years, 9 months ago
A is the Answer all are not applicable
upvoted 2 times
...
roger8978
2 years, 10 months ago
The answer is B. Do your own research. don't just choose the majority side. Automatic Key Rotation can't help in case of a compromised key. Look at the AWS Docs. automatic key rotation has no effect on the data that the KMS key protects. It does not rotate the data keys that the KMS key generated or re-encrypt any data protected by the KMS key, and it will not mitigate the effect of a compromised data key. https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html
upvoted 4 times
...
pmjcr
3 years ago
A - Their talking about best practices, not when a security breach occur. Under normal operations, as best practice the option A is the best practice
upvoted 1 times
...
sanjaym
3 years ago
Ans: A 100%
upvoted 1 times
...
Umer24
3 years ago
New Question: A company uses AWS KMS with CMKs and manual key rotation to meet regulatory compliance requirements. The security team wants to be notified when any keys have not been rotated after 90 days. Which solution will accomplish this? A. Configure AWS KMS to publish to an Amazon SNS topic when keys are more than 90 days old. B. Configure an Amazon CloudWatch Events event to launch an AWS Lambda function to call the AWS Trusted Advisor API and publish to an Amazon SNS topic. C. Develop an AWS Config custom rule that publishes to an Amazon SNS topic when keys are more than 90 days old. D. Configure AWS Security Hub lo publish to an Amazon SNS topic when keys are more than 90 days old.
upvoted 1 times
thejas13
3 years ago
Option C
upvoted 5 times
...
...
Ayusef
3 years ago
I think B..
upvoted 1 times
...
devjava
3 years ago
"A" should work with automatic rotation and encrypting the new data, so even if a key is compromised only limited data is exposed.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...