Home › Forums › AWS › AWS Certified Solutions Architect Associate › Practice Exam 3 Question › Reply To: Practice Exam 3 Question
-
Hello Denzil,
Welcome to the TD, and it’s great to see you’re diving deep into AWS security concepts! Your questions show a keen interest in understanding the nuances of data encryption in AWS, particularly with S3. Let’s address your queries one by one.
The concept of Dual-Layer server-side encryption with AWS Key Management Service (KMS) keys, or DDSE-KMS, is an advanced encryption model where data is encrypted under two layers of security managed by AWS KMS. For your first question, “Why was to Encrypt your data using your own encryption keys”. This option represents client-side encryption, where you encrypt the data on your side before uploading it to S3. This approach gives you complete control over the encryption keys and the encryption process. It’s beneficial when you want to ensure that no one, not even AWS, can decrypt your data without your keys.
Secondly, your question about “Why AWS KMS (DDSE-KMS) wasn’t explicitly listed as one of the options”. AWS Key Management Service (KMS) is a highly secure and convenient way to manage encryption keys and implement server-side and client-side encryption within AWS services, including S3. It wasn’t specified because the question aimed to test your knowledge of basic encryption capabilities within S3.
The decision between using your own encryption keys or AWS KMS is not purely about cost, though cost can be a factor. AWS KMS involves costs based on the number of API calls and the management of customer master keys, but it also offers benefits in terms of ease of use, integration with AWS services, and security features like key rotation and centralized management. Using your own keys might avoid these costs but requires more effort in key management, security, and compliance.
Whether you’re encrypting data client-side or server-side, using a secure protocol such as HTTPS for uploading your data to S3 is essential. HTTPS ensures that your data is encrypted in transit, preventing interception by third parties Amazon S3 can accept data that’s already encrypted client-side without any issues. When you upload client-side encrypted data to an S3 bucket, even if the bucket is configured to use default encryption (such as SSE-S3 or SSE-KMS), S3 stores the uploaded data as-is. The data will remain encrypted with your client-side encryption and any server-side encryption applied by the bucket’s settings. Essentially, the data is double-encrypted, once by you before upload and once by S3 upon storage if server-side encryption is enabled.
If you have any more questions or need further clarification, feel free to ask.
Regards,
Nikee @ Tutorials Dojo