Q: 11
A health insurance company stores personally identifiable information (PII) in an Amazon S3 bucket.
The company uses server-side encryption with S3 managed encryption keys (SSE-S3) to encrypt the
objects. According to a new requirement, all current and future objects in the S3 bucket must be
encrypted by keys that the company’s security team manages. The S3 bucket does not have
versioning enabled.
Which solution will meet these requirements?
Options
Discussion
B makes sense here. SSE-KMS with your own customer-managed key aligns with the company-managed requirement, and re-uploading fixes the existing files. D looks tempting but doesn't directly mention KMS, which is a trap since that's how AWS handles customer keys properly. Seen similar wording on practice tests.
B tbh. Changing to SSE-KMS with a customer-managed key plus re-upload covers the 'all current and future objects' part. Denying unencrypted uploads helps too. Pretty sure that's what they're looking for.
Probably B. Matches what I've seen in similar questions, clear on covering both current and future objects with company-managed keys.
Be respectful. No spam.
Question 11 of 35