Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam AWS Certified Solutions Architect - Associate SAA-C03 topic 1 question 36 discussion

A company is building an application in the AWS Cloud. The application will store data in Amazon S3 buckets in two AWS Regions. The company must use an AWS Key Management Service (AWS KMS) customer managed key to encrypt all data that is stored in the S3 buckets. The data in both S3 buckets must be encrypted and decrypted with the same KMS key. The data and the key must be stored in each of the two Regions.
Which solution will meet these requirements with the LEAST operational overhead?

  • A. Create an S3 bucket in each Region. Configure the S3 buckets to use server-side encryption with Amazon S3 managed encryption keys (SSE-S3). Configure replication between the S3 buckets.
  • B. Create a customer managed multi-Region KMS key. Create an S3 bucket in each Region. Configure replication between the S3 buckets. Configure the application to use the KMS key with client-side encryption.
  • C. Create a customer managed KMS key and an S3 bucket in each Region. Configure the S3 buckets to use server-side encryption with Amazon S3 managed encryption keys (SSE-S3). Configure replication between the S3 buckets.
  • D. Create a customer managed KMS key and an S3 bucket in each Region. Configure the S3 buckets to use server-side encryption with AWS KMS keys (SSE-KMS). Configure replication between the S3 buckets.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
pooppants
Highly Voted 1 year, 7 months ago
Selected Answer: B
KMS Multi-region keys are required https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html
upvoted 62 times
Instantqueue
7 months, 1 week ago
It’s not correct because the question asks for server side encryption, not client side (before the objects reach the bucket).
upvoted 6 times
kelmryan1
1 week, 5 days ago
It says encrypt all data and the data originates from the application. Making it B
upvoted 1 times
...
...
sohailn
9 months, 1 week ago
Absoutely D is the right one because s3 kms multi region as an individual key so you must first decrypt in source bucket and then re-encrypt in target bucket
upvoted 6 times
0203b0f
1 week, 2 days ago
Answer is D : This option aligns with the requirement to use a customer-managed KMS key for encryption. It also ensures that the same KMS key is used for encryption and decryption across both AWS Regions, as required. By using SSE-KMS, you can ensure that encryption keys are managed by AWS KMS, providing greater control and security over the encryption process. Configuring replication between the S3 buckets ensures that data is synchronized across both regions. This approach minimizes operational overhead while meeting the specified requirements.
upvoted 1 times
...
kelmryan1
1 week, 5 days ago
The SAME key would exist in both regions
upvoted 1 times
...
sakurali
7 months ago
Each set of related multi-Region keys has the same key material and key ID, so you can encrypt data in one AWS Region and decrypt it in a different AWS Region without re-encrypting or making a cross-Region call to AWS KMS.
upvoted 4 times
...
...
Johan_jelly
5 months ago
KMS multi-region keys are typically used when you need to enable cross-Region replication of encrypted data
upvoted 1 times
...
magazz
1 year, 5 months ago
Amazon S3 cross-region replication decrypts and re-encrypts data under a KMS key in the destination Region, even when replicating objects protected by a multi-Region key. So stating that Amazon S3 cross-region replication decrypts and re-encrypts data under a KMS key in the destination Region, even when replicating objects protected by a multi-Region key is required is incorrect
upvoted 3 times
thanhvx1
1 year, 1 month ago
Option B involves configuring the application to use client-side encryption, which can increase the operational overhead of managing and securing the keys.
upvoted 2 times
...
TuLe
1 year, 5 months ago
@magazz: it's not true then. Based on the document from AWS https://docs.aws.amazon.com/AmazonS3/latest/userguide/replication-config-for-kms-objects.html , we will need to setup the replication rule with destination KMS. In order to have the key available in more than 2, then multi-region key should be required. But I'm still not favor option B - we can use server-side when why wasting effort to do client side encryption.
upvoted 2 times
TuLe
1 year, 5 months ago
I would say it's true... Not sure the previous one say "not true" :D.
upvoted 1 times
JayBee65
1 year, 5 months ago
It's not clear what you are saying. Are you saying that B is correct or D is correct?
upvoted 2 times
karbob
1 year, 4 months ago
:D => is smile i thought
upvoted 2 times
...
...
...
...
...
...
KJa
Highly Voted 1 year, 7 months ago
Selected Answer: D
Cannot be A - question says customer managed key Cannot B - client side encryption is operational overhead Cannot C -as it says SSE-S3 instead of customer managed so the answer is D though it required one time setup of keys
upvoted 55 times
mattlai
1 year, 7 months ago
fun joke, if u dont do encryption on client side, where else could it be?
upvoted 1 times
Newptone
1 year, 6 months ago
It could be server side. For client side, the application need to finish the encryption and decryption by itself. So S3 object encryption on the server side is less operational overhead. https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingClientSideEncryption.html But for option B, the major issue is if you create KMS keys in 2 regions, they can not be the same.
upvoted 7 times
Newptone
1 year, 6 months ago
Sorry for the typo, I mean option D.
upvoted 2 times
...
...
...
Clouddon
9 months, 1 week ago
Kindly point at where server-side encryption support multi-region. It is only mention on the aws blog that client-side support multi-region.
upvoted 2 times
...
th3cookie
1 year, 6 months ago
How does client side encryption increase OPERATIONAL overhead? Do you think every connected client is sitting there with gpg cli, decrypting/encrypting every packet that comes in/out? No, it's done via SDK -> https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html The correct answer is B because that's the only way to actually get the same key across multiple regions with minimal operational overhead
upvoted 12 times
kakka22
1 year, 1 month ago
"The data in both S3 buckets must be encrypted and decrypted with the same KMS key" Client side encryption means that key is generated in from the cient without storing that in the KMS...
upvoted 5 times
...
...
BoboChow
1 year, 7 months ago
The data in both S3 buckets must be encrypted and decrypted with the same KMS key. AWS KMS supports multi-Region keys, which are AWS KMS keys in different AWS Regions that can be used interchangeably – as though you had the same key in multiple Regions. "as though" means it's different. So I agree with B
upvoted 13 times
BoboChow
1 year, 7 months ago
key change across regions unless you use multi-Region keys
upvoted 2 times
...
pentium75
4 months, 3 weeks ago
B includes replicating the data in the S3 buckets, which is not mentioned anywhere in the stem. It says that you need to store data in two buckets, not that you need to replicate content between buckets.
upvoted 1 times
Drew3000
2 months, 1 week ago
All the choices involve replication between the buckets.
upvoted 1 times
...
...
...
...
zinabu
Most Recent 2 weeks, 3 days ago
Selected Answer: B
B is correct
upvoted 1 times
...
ManikRoy
3 weeks ago
Selected Answer: B
Its likely to be option B as it is the only option that mentions KMS multi region Keys. Multi region keys can also be used for client side encryption. Also CSE means the object will be encrypted before it reaches S3 bucket and will be decrypted after the object is fetched from S3 bucket, so while in S3 bucket it stays in encrypted status.
upvoted 1 times
...
Karthikdav
1 month ago
Selected Answer: D
The question specifically says to use client managed keys and not client side encryption.
upvoted 2 times
...
jaykania
1 month ago
Selected Answer: D
Can't be B as the question requires SSE and not CSE
upvoted 1 times
...
zinabu
1 month ago
Both B & D have their own problems , C, it was ok with multi region KMS key since we need the same key for both regions , but the problem is it says client side encryption , Using KMS is server side encryption from the beginning. D, it says to create S3 bucket and KMS key in each region, that means the two key for the two region are not the same cause we create for each region. but the question asked to use the same key.
upvoted 1 times
...
Selected Answer: D
It has to be D, Client-side encryption requires additional handling within the application code, increasing operational overhead if we go with option B. So with option of elimination, next best option is D.
upvoted 1 times
...
ml1190
1 month, 3 weeks ago
SSE encryption is not required and multi-region keys support client side encryption, so the correct answer is B
upvoted 1 times
...
hro
1 month, 3 weeks ago
C - The question implies that the Data AND Key must be in EACH of the two Regions
upvoted 1 times
...
MoAboDaif
2 months ago
Selected Answer: D
he sayed "The company must use an Key Management Service (AWS KMS) customer managed key" B. is using client side encryption not even aws key Right... ??
upvoted 1 times
...
NishantM
2 months, 1 week ago
Selected Answer: D
It is mentioning server side encryption using KMS.
upvoted 1 times
...
jhakas_bijoy
2 months, 3 weeks ago
Selected Answer: B
this is clear case of multi region key
upvoted 1 times
...
TheFivePips
2 months, 3 weeks ago
Selected Answer: B
"A single-Region KMS key generated by AWS KMS is stored and used only in the Region in which it was created. With AWS KMS multi-Region keys you can choose to replicate a multi-Region primary key into multiple Regions within the same AWS partition." https://aws.amazon.com/kms/faqs/
upvoted 1 times
...
Mohammed_Kamal
3 months ago
Selected Answer: B
i found the answer guys. acually i never found resource state that normal keys (not multi regions key) can be replicated across region. also i found this "A single-Region KMS key generated by AWS KMS is stored and used only in the Region in which it was created. With AWS KMS multi-Region keys you can choose to replicate a multi-Region primary key into multiple Regions within the same AWS partition." which mean option D can't never be correct since key can't be used in another region which seem logically otherwise they wouldn't make multi region keys if we can simply copy keys
upvoted 2 times
...
modehqudah
3 months, 2 weeks ago
Selected Answer: B
The data in both S3 buckets must be encrypted and decrypted with the same KMS key.
upvoted 1 times
...
klimaxk666
3 months, 2 weeks ago
Selected Answer: B
By creating a customer managed multi-Region KMS key, you can have a single key that works across both AWS Regions. Creating an S3 bucket in each Region allows you to store data in both Regions. Configuring replication between the S3 buckets ensures that the data is replicated between the Regions. Using client-side encryption with the KMS key ensures that the data is encrypted and decrypted with the same KMS key
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...