Which of the following is the correct sequence of how KMS manages the keys when used along with the Redshift cluster service

Posted by: Pdfprep Category: SCS-C01 Tags: , ,

Which of the following is the correct sequence of how KMS manages the keys when used along with the Redshift cluster service
A . The master keys encrypts the cluster key. The cluster key encrypts the database key.
The database key encrypts the data encryption keys.

B . The master keys encrypts the database key. The database key encrypts the data encryption keys.
C . The master keys encrypts the data encryption keys. The data encryption keys encrypts the database key
D . The master keys encrypts the cluster key, database key and data encryption keys

Answer: A

Explanation:

This is mentioned in the AWS Documentation

Amazon Redshift uses a four-tier, key-based architecture for encryption. The architecture consists of data encryption keys, a database key, a cluster key, and a master key.

Data encryption keys encrypt data blocks in the cluster. Each data block is assigned a randomly-generated AES-256 key. These keys are encrypted by using the database key for the cluster.

The database key encrypts data encryption keys in the cluster. The database key is a randomly-generated AES-256 key. It is stored on disk in a separate network from the Amazon Redshift cluster and passed to the cluster across a secure channel. The cluster key encrypts the database key for the Amazon Redshift cluster.

Option B is incorrect because the master key encrypts the cluster key and not the database key

Option C is incorrect because the master key encrypts the cluster key and not the data encryption keys

Option D is incorrect because the master key encrypts the cluster key only

For more information on how keys are used in Redshift, please visit the following URL:

https://docs.aws.amazon.com/kms/latest/developereuide/services-redshift.html

The correct answer is: The master keys encrypts the cluster key. The cluster key encrypts the database key. The database key encrypts the data encryption keys. Submit your Feedback/Queries to our Experts

Leave a Reply

Your email address will not be published.