AWS SAA-C03 #121

A company is running an online transaction processing (OLTP) workload on AWS. This workload uses an unencrypted Amazon RDS DB instance in a Multi-AZ deployment. Daily database snapshots are taken from this instance.

What should a solutions architect do to ensure the database and snapshots are always encrypted moving forward?

A. Encrypt a copy of the latest DB snapshot. Replace existing DB instance by restoring the encrypted snapshot.

B. Create a new encrypted Amazon Elastic Block Store (Amazon EBS) volume and copy the snapshots to it. Enable encryption on the DB instance.

C. Copy the snapshots and enable encryption using AWS Key Management Service (AWS KMS) Restore encrypted snapshot to an existing DB instance.

D. Copy the snapshots to an Amazon S3 bucket that is encrypted using server-side encryption with AWS Key Management Service (AWS KMS) managed keys (SSE-KMS).


The correct answer is A. Encrypt a copy of the latest DB snapshot. Replace existing DB instance by restoring the encrypted snapshot.

Here's why:

  • Amazon RDS does not support encrypting an existing DB instance. Therefore, to encrypt an existing unencrypted DB instance, you must create a snapshot of the DB instance, and then create a copy of that snapshot that is encrypted. You can then restore a DB instance from the encrypted snapshot, and thus you have an encrypted copy of the original DB instance.

  • Options B, C, and D are not valid because they either involve steps that are not supported by AWS or they do not result in an encrypted DB instance.

Remember, it's important to understand the capabilities and limitations of the AWS services you are using to ensure you are implementing solutions that are secure and efficient. If you have any more questions, feel free to ask!

Sure, here's why the other options are incorrect:

  • Option B: Amazon Elastic Block Store (Amazon EBS) and Amazon RDS are different services with different capabilities. Amazon EBS volumes can be encrypted at any time, but Amazon RDS DB instances cannot be encrypted after they are created. Therefore, copying snapshots to an encrypted EBS volume would not result in an encrypted DB instance.

  • Option C: While you can copy a snapshot and enable encryption using AWS Key Management Service (AWS KMS), you cannot restore an encrypted snapshot to an existing DB instance. The existing DB instance would need to be deleted and a new one created from the encrypted snapshot.

  • Option D: Copying the snapshots to an Amazon S3 bucket that is encrypted using server-side encryption with AWS Key Management Service (AWS KMS) managed keys (SSE-KMS) would not result in an encrypted DB instance. Amazon S3 and Amazon RDS are different services and their encryption settings are managed separately.

I hope this clarifies your doubts! If you have any more questions, feel free to ask.

相关推荐
小扎仙森36 分钟前
关于阿里云实时语音翻译-Gummy加WebSocket实现翻译功能
websocket·阿里云·云计算
腾科IT教育1 小时前
广东广州华为认证考点在哪里
华为云·云计算·hcie·华为认证考试
TG_yunshuguoji17 小时前
亚马逊云代理商:CloudWatch 日志查询实战 5 步精准定位 AWS 故障
服务器·云计算·aws
TG_yunshuguoji19 小时前
阿里云代理商:百炼用AI重新定义图像的诞生
人工智能·阿里云·云计算
ZStack开发者社区20 小时前
技术解析:ZStack 计算 + 存储双利旧,破解数据中心异构纳管与资产浪费痛点
服务器·云计算
小哈里21 小时前
【架构】Server-Survival,扮演云架构师的塔防游戏,生存策略
游戏·架构·云计算·架构师·策略
亚林瓜子21 小时前
AWS上给ALB配置错误率告警监控
云计算·aws·alarm·elb·cloudwatch·alb·cw
最新快讯1 天前
AI Agent引爆算力革命:云计算变身“24小时印钞机”
人工智能·云计算
老友@1 天前
云计算的统一心智模型
开发语言·ci/cd·docker·云计算·k8s·perl
翼龙云_cloud1 天前
阿里云代理商:阿里云百炼视频混剪实战
服务器·阿里云·云计算