
Ultimate access to all questions.
Discuss how you would design an incident response plan that includes the use of AWS KMS for encryption key management during and after a security incident. What specific measures would you take to ensure the integrity and confidentiality of the encryption keys?
A
Use AWS KMS only for basic key management without specific measures.
B
Implement specific measures in AWS KMS to ensure the integrity and confidentiality of encryption keys, including role-based access controls and regular key rotation.
C
Ignore AWS KMS and rely on third-party key management solutions.
D
Assume no need for encryption key management during incidents.