exam questions

Exam AWS Certified Developer Associate All Questions

View all questions & answers for the AWS Certified Developer Associate exam

Exam AWS Certified Developer Associate topic 1 question 297 discussion

Exam question from Amazon's AWS Certified Developer Associate
Question #: 297
Topic #: 1
[All AWS Certified Developer Associate Questions]

A company must encrypt sensitive data that the company will store in Amazon S3. A developer must retain total control over the company's AWS Key Management Service (AWS KMS) key and the company’s data keys. The company currently uses an on-premises hardware security module (HSM) solution. The company wants to move its key management onto AWS.

Which solution will meet these requirements?

  • A. Implement server-side encryption with AWS KMS managed keys (SSE-KMS). Use AWS CloudHSM to generate the KMS key and data keys to use with AWS KMS.
  • B. Implement server-side encryption with customer-provided encryption keys (SSE-C). Use AWS CloudHSM to generate the KMS key and manage the data keys that the company will use to read and write objects to Amazon S3.
  • C. Implement server-side encryption with Amazon S3 managed encryption keys (SSE-S3). Use AWS CloudHSM to generate the KMS key and manage the data keys that the company will use to read and write objects to Amazon S3.
  • D. Implement server-side encryption with AWS KMS managed keys (SSE-KMS). Use the AWS KMS custom key store feature to manage the data keys. Then read or write objects to Amazon S3 as normal.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
k1kavi1
Highly Voted 2 years, 4 months ago
Selected Answer: B
Choosing B
upvoted 7 times
...
kyoharo
Most Recent 1 year, 5 months ago
Selected Answer: B
The correct solution is B. Implement server-side encryption with customer-provided encryption keys (SSE-C). Use AWS CloudHSM to generate the KMS key and manage the data keys that the company will use to read and write objects to Amazon S3. This solution meets all of the company's requirements: It uses SSE-C to encrypt the data with the company's own encryption keys. It uses AWS CloudHSM to generate the KMS key and manage the data keys. This gives the company total control over its keys. It allows the company to move its key management to AWS.
upvoted 2 times
...
rcaliandro
1 year, 10 months ago
Selected Answer: A
Difficult one. I would say A because we need to manage company's keys and AWS Keys (since there are also AWS Keys, I am excluding SSE-C). Then, we need to generate the key using hw and we can do that with CloudHSM .
upvoted 1 times
...
m4r0ck
2 years, 2 months ago
Selected Answer: D
D, the company simply wants to move the key management to AWS. Whilst CloudHSM will provide similar features to their on premise HSM, KMS provides similar features to CloudHSM and easily scalable whilst CloudHSM is not easily maintainable in addition to its high cost compared to KMS.
upvoted 2 times
...
Ankit1010
2 years, 2 months ago
D To meet the requirements of retaining total control over the company's AWS KMS key and the company’s data keys, and using an on-premises HSM solution to generate and manage those keys, the best solution would be to use the AWS KMS custom key store feature. Therefore, the correct answer is: D. Implement server-side encryption with AWS KMS managed keys (SSE-KMS). Use the AWS KMS custom key store feature to manage the data keys. Then read or write objects to Amazon S3 as normal. By using AWS KMS with the custom key store feature, the company can keep its existing on-premises HSM solution while still taking advantage of AWS KMS to generate and manage the data keys that are used to encrypt and decrypt the sensitive data stored in Amazon S3. This solution allows the company to retain complete control over its keys while still taking advantage of the benefits of using AWS KMS.
upvoted 3 times
Ankit1010
2 years, 2 months ago
Option A (SSE-KMS with AWS CloudHSM) would also provide some control over the keys, but it does not provide the same level of control as the custom key store feature. Option B (SSE-C with AWS CloudHSM) would give the company complete control over the data keys but would not allow them to use AWS KMS to generate and manage those keys. Option C (SSE-S3 with AWS CloudHSM) would not allow the company to use their on-premises HSM solution and would not provide complete control over the keys.
upvoted 1 times
...
...
mistral
2 years, 2 months ago
Selected Answer: A
https://www.youtube.com/watch?v=BLnuUtjJNLE https://docs.aws.amazon.com/kms/latest/developerguide/create-cmk-keystore.html https://aws.amazon.com/kms/faqs/
upvoted 2 times
mistral
2 years, 2 months ago
I was wrong. I believe D is correct answer. Sorry.
upvoted 1 times
...
...
by116549
2 years, 3 months ago
Question states "retain total control over the company's AWS Key Management Service (AWS KMS) key and the company’s data keys" This rules out A and C. Checking this resource "generated by AWS KMS, generated within an AWS CloudHSM cluster or external key manager (through the custom key store), or import your own key material" : https://aws.amazon.com/kms/faqs/ If total control is required then D seems the best fit
upvoted 3 times
...
fabriciollf
2 years, 4 months ago
Selected Answer: D
The correct answer is D. Please see the AWS FAQ for CloudHSM: https://docs.aws.amazon.com/cloudhsm/latest/userguide/best-practices.html Q: Can other AWS services use CloudHSM to store and manage keys? AWS services integrate with AWS Key Management Service, which in turn is integrated with AWS CloudHSM through the KMS custom key store feature. If you want to use the server-side encryption offered by many AWS services (such as EBS, S3, or Amazon RDS), you can do so by configuring a custom key store in AWS KMS.
upvoted 2 times
...
mrbig00
2 years, 4 months ago
Selected Answer: A
The correct solution is option A. Implementing server-side encryption with AWS KMS managed keys (SSE-KMS) will allow the company to encrypt sensitive data stored in Amazon S3 using keys that are managed by AWS KMS. Using AWS CloudHSM to generate the KMS key and data keys to use with AWS KMS will allow the developer to retain total control over the keys. This solution will meet the company's requirement of retaining control over their keys and encrypting their sensitive data in Amazon S3.
upvoted 2 times
...
fswklotto1
2 years, 4 months ago
Selected Answer: D
Vote for D
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago