4-Encryption Flashcards

1
Q

Where are KMS encryption keys located?

A

They strictly remain within a region - they can’t be exported or used to decrypt data in another region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a CMK consist of?

A

An alias, creation data, description and key state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the broad IAM roles for KMS?

A

Administrative permissions and usage permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the main CLI commands to use KMS?

A

Encrypt, decrypt, re-encrypt and enable-key-rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How often are CMKs rotated?

A

If AWS is used as the key material, once a year if rotation is enabled

Otherwise, it’s up to the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does KMS use CMKs?

A

It uses envelope encryption - the CMK is used to encrypt the data key which works on the actual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly