exam questions

Exam AWS Certified Solutions Architect - Associate SAA-C03 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Associate SAA-C03 exam

Exam AWS Certified Solutions Architect - Associate SAA-C03 topic 1 question 202 discussion

A company is planning to move its data to an Amazon S3 bucket. The data must be encrypted when it is stored in the S3 bucket. Additionally, the encryption key must be automatically rotated every year.

Which solution will meet these requirements with the LEAST operational overhead?

  • A. Move the data to the S3 bucket. Use server-side encryption with Amazon S3 managed encryption keys (SSE-S3). Use the built-in key rotation behavior of SSE-S3 encryption keys.
  • B. Create an AWS Key Management Service (AWS KMS) customer managed key. Enable automatic key rotation. Set the S3 bucket’s default encryption behavior to use the customer managed KMS key. Move the data to the S3 bucket.
  • C. Create an AWS Key Management Service (AWS KMS) customer managed key. Set the S3 bucket’s default encryption behavior to use the customer managed KMS key. Move the data to the S3 bucket. Manually rotate the KMS key every year.
  • D. Encrypt the data with customer key material before moving the data to the S3 bucket. Create an AWS Key Management Service (AWS KMS) key without key material. Import the customer key material into the KMS key. Enable automatic key rotation.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Buruguduystunstugudunstuy
Highly Voted 2 years, 1 month ago
Selected Answer: A
KEYWORD: LEAST operational overhead To encrypt the data when it is stored in the S3 bucket and automatically rotate the encryption key every year with the least operational overhead, the company can use server-side encryption with Amazon S3-managed encryption keys (SSE-S3). SSE-S3 uses keys that are managed by Amazon S3, and the built-in key rotation behavior of SSE-S3 encryption keys automatically rotates the keys every year. To meet the requirements of the company, the solutions architect can move the data to the S3 bucket and enable server-side encryption with SSE-S3. This solution requires no additional configuration or maintenance and has the least operational overhead. Hence, the correct answer is; Option A. Move the data to the S3 bucket. Use server-side encryption with Amazon S3-managed encryption keys (SSE-S3). Use the built-in key rotation behavior of SSE-S3 encryption keys.
upvoted 44 times
bicrasse
1 year, 2 months ago
The good answer was B before may 2022, because the rotation schedule for AWS managed keys was 3 years (SSE-S3 is based on it)... From may 2022 the schedule rotation is 1 year, then A is now the best answer because there is NO operational task to do: S3 is by default encrypted at rest with SSE-S3 (rotation every year)... So it depends if the question has been updated since 2022
upvoted 17 times
...
Buruguduystunstugudunstuy
2 years, 1 month ago
Option B involves using a customer-managed AWS KMS key and enabling automatic key rotation, but this requires the company to manage the KMS key and monitor the key rotation process. Option C involves using a customer-managed AWS KMS key, but this requires the company to manually rotate the key every year, which introduces additional operational overhead. Option D involves encrypting the data with customer key material and creating a KMS key without key material, but this requires the company to manage the customer key material and import it into the KMS key, which introduces additional operational overhead.
upvoted 3 times
JayBee65
2 years ago
But... For A there is no reference to how often these keys are rotated, and to rotate to a new key, you need to upload it, which is operational overhead. So not only does it not necessarily meet the 'rotate keys every year' requirement, but every year it requires operational overhead. More importantly, the question states move the objects first, and then configure encryption, but ..."There is no change to the encryption of the objects that existed in the bucket before default encryption was enabled." from https://docs.aws.amazon.com/AmazonS3/latest/userguide/default-bucket-encryption.html So A is clearly wrong. For B, whilst you have to set up KMS once, you then don't have to anything else, which i would say is LEAST operational overhead.
upvoted 29 times
...
ocbn3wby
2 years, 1 month ago
God bless you, man! The most articulated answers, easy to understand. Good job!
upvoted 4 times
JayBee65
2 years ago
But wrong :)
upvoted 5 times
ocbn3wby
2 years ago
Reviewed it the second time. Some of them are wrong, indeed.
upvoted 1 times
...
...
...
...
LuckyAro
2 years ago
The order of these events is being ignored here in my opinion. The encryption checkbox needs to be checked before data is moved into the S3 bucket or it will not be encrypted otherwise, you'll have to encrypt manually and reload into S3 bucket. If the box was checked before moving data into S3 then you are good to go !
upvoted 9 times
Smart
1 year, 6 months ago
Ignoring the new changes that the default encryption is already enabled. I agree that the encryption should be configured before moving the data into the bucket. Otherwise, the existing objects will remain unencrypted. Correct Answer is B. Additionally, where is the reference that SSE-S3 will rotate keys every year (which is the question's requirement).
upvoted 3 times
...
LuckyAro
2 years ago
https://docs.aws.amazon.com/AmazonS3/latest/userguide/default-bucket-encryption.html
upvoted 2 times
Wang87
1 year, 1 month ago
SSE DOES not rotate encryption keys, it changes master key used to lock encryption keys which creates new ciphered key and stores it.
upvoted 4 times
...
...
...
pentium75
1 year, 1 month ago
SSE-S3 rotates the keys when AWS wants it, not "every year" like required here.
upvoted 3 times
pentium75
1 year, 1 month ago
No, I stand corrected. All AWS managed keys are automatically rotated every year. You cannot change this rotation schedule.
upvoted 4 times
awsgeek75
1 year, 1 month ago
I want to find a source for this yearly rotation because SSE-S3 just rotates periodically and doesn't say it follows the same policy as other managed key. I think you may be right but just need a doc link
upvoted 3 times
Maru86
11 months, 2 weeks ago
https://repost.aws/questions/QUES_1VN01TU-eRSO3LXergA/s3-managed-key-sse-s3-rotation-period
upvoted 2 times
JA2018
2 months, 2 weeks ago
Check out the AWs link mentioned in the response: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-mgmt For AWS managed key (https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk) Automatic rotation (https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html) --> Required. Every year (approximately 365 days).
upvoted 1 times
...
...
...
tohegajaf
1 year, 1 month ago
https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#master_keys
upvoted 1 times
JA2018
2 months, 2 weeks ago
For AWS managed key (https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk) Automatic rotation (https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html) --> Required. Every year (approximately 365 days).
upvoted 1 times
FlyingHawk
4 days, 6 hours ago
Amazon S3 encrypts each object with a unique key. As an additional safeguard, it encrypts the key itself with a root key that it regularly rotates. However, AWS does not publicly disclose the specific frequency of these rotations
upvoted 1 times
...
...
...
...
...
...
techhb
Highly Voted 2 years, 1 month ago
Selected Answer: B
SSE-S3 - is free and uses AWS owned CMKs (CMK = Customer Master Key). The encryption key is owned and managed by AWS, and is shared among many accounts. Its rotation is automatic with time that varies as shown in the table here. The time is not explicitly defined. SSE-KMS - has two flavors: AWS managed CMK. This is free CMK generated only for your account. You can only view it policies and audit usage, but not manage it. Rotation is automatic - once per 1095 days (3 years), Customer managed CMK. This uses your own key that you create and can manage. Rotation is not enabled by default. But if you enable it, it will be automatically rotated every 1 year. This variant can also use an imported key material by you. If you create such key with an imported material, there is no automated rotation. Only manual rotation. SSE-C - customer provided key. The encryption key is fully managed by you outside of AWS. AWS will not rotate it.
upvoted 33 times
ruqui
1 year, 8 months ago
AWS managed CMK rotates every 365 days (not 1095 days). Reference: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-mgmt
upvoted 3 times
...
...
FlyingHawk
Most Recent 4 days, 6 hours ago
Selected Answer: B
AWS does not specify the exact rotation frequency for SSE-S3 root keys, AWS Managed Keys are rotated annually, and Customer Managed Keys offer customizable rotation options.
upvoted 1 times
...
suresh_01
1 week, 5 days ago
Selected Answer: A
Amazon S3 now applies server-side encryption with Amazon S3 managed keys (SSE-S3) as the base level of encryption for every bucket in Amazon S3. Starting January 5, 2023, all new object uploads to Amazon S3 are automatically encrypted at no additional cost and with no impact on performance. The automatic encryption status for S3 bucket default encryption configuration and for new object uploads is available in AWS CloudTrail logs, S3 Inventory, S3 Storage Lens, the Amazon S3 console, and as an additional Amazon S3 API response header in the AWS Command Line Interface and AWS SDKs.
upvoted 1 times
...
4729e6c
3 weeks, 2 days ago
Selected Answer: B
A is incorrect because SSE-S3 rotates keys when AWS thinks is right, not when customer wants ("every year") B is correct because AWS KMS customer managed keys allow automatic key rotation every year, meeting the requirement while minimizing operational overhead.
upvoted 1 times
...
RakshithKV
1 month ago
Selected Answer: B
Encryption in S3: S3 supports encryption at rest using Server-Side Encryption (SSE). Key Rotation: SSE-S3 (Option A): Uses Amazon S3-managed encryption keys, but these keys do not provide configurable automatic rotation or fine-grained control over key management. Customer Managed Keys in AWS KMS (Option B): Allow full control, including automatic key rotation every year, meeting the requirement with low operational overhead. Manually rotating keys (Option C) adds operational overhead and is unnecessary since AWS KMS supports automatic rotation. Client-Side Encryption (Option D) increases operational complexity unnecessarily.
upvoted 1 times
...
HiraPBI
1 month, 1 week ago
Selected Answer: B
B seems correct option as AWS does not specify the keys rotation period for SSE-S3. So, it cannot be A.
upvoted 1 times
...
hilker1983
1 month, 1 week ago
Selected Answer: B
AWS Key Management Service (KMS) customer managed keys support automatic annual rotation. By setting the S3 bucket's default encryption to use this KMS key, data is encrypted automatically when stored. Meets both the encryption and rotation requirements with low operational overhead.
upvoted 1 times
...
dipenich
1 month, 3 weeks ago
Selected Answer: B
Why Option B is Correct: AWS KMS Customer Managed Keys (CMKs): Customer managed KMS keys allow you to control encryption and enable automatic key rotation. Key rotation is handled seamlessly by AWS KMS, with no manual intervention required. Default S3 Encryption Behavior: Setting the S3 bucket’s default encryption to use the KMS CMK ensures all objects are automatically encrypted as they are uploaded. Operational Overhead: AWS automatically rotates the keys annually without impacting existing encrypted data, reducing operational overhead.
upvoted 1 times
...
GilbertMuneka
1 month, 3 weeks ago
Selected Answer: A
Agree with A - Least operational overhead is the word we should be looking for.
upvoted 1 times
...
ARV14
1 month, 3 weeks ago
Selected Answer: B
https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html#rotate-keys-manually AWS owned keys You cannot enable or disable key rotation for AWS owned keys. The key rotation strategy for an AWS owned key is determined by the AWS service that creates and manages the key. For details, see the Encryption at Rest topic in the user guide or developer guide for the service.
upvoted 1 times
...
SteveNguyen
1 month, 4 weeks ago
Selected Answer: B
SSE-S3 does not support automatic key rotation. https://repost.aws/questions/QUES_1VN01TU-eRSO3LXergA/s3-managed-key-sse-s3-rotation-period
upvoted 1 times
...
jayessh
2 months, 3 weeks ago
Selected Answer: A
nowhere in question they mentioned about control over keys or customization of keys, so choosing option B shouldnt be considered. In Option A SSE-S3, AWS manages everything . Primary concern raised in question is operational overhead with autorotation of keys.
upvoted 2 times
...
Johnoppong101
5 months, 1 week ago
Selected Answer: A
SSE-S3 is powerful for data encryption at rest guys. Each single object is encrypted with a different key. SSE-S3 automatically rotates all keys. However, SSE-S3 does not log any information concerning key encryption or rotation.
upvoted 3 times
JA2018
2 months, 2 weeks ago
For AWS managed key (https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk) Automatic rotation (https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html) --> Required. Every year (approximately 365 days).
upvoted 1 times
...
Johnoppong101
5 months, 1 week ago
Rotation on a yearly basis.
upvoted 3 times
...
...
Sgigi
5 months, 4 weeks ago
Selected Answer: B
As far as I know, SSE-S3 encryption uses keys which we can't view, nor do we know the rotation period of them. SSE-S3 and AWS-Managed KMS Keys are not the same: AWS Managed KMS Keys are rotated every 365 days AWS Customer-Managed Keys have optional rotation SSE-S3 Encryption is not either of them, thus A should be eliminated. Since we do not have an option here to use an AWS-managed KMS key, the only valid option is to use a customer-managed key and enable key rotation.
upvoted 3 times
...
jatric
7 months ago
Selected Answer: A
All options except A suggesting cusomer key, why customer key would be needed here.
upvoted 3 times
...
ChymKuBoy
7 months, 2 weeks ago
Selected Answer: B
B for sure
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago