
Answer-first summary for fast verification
Answer: Take a snapshot of the RDS DB instance in the production account. Amend the KMS key policy of the `production-rds-key` KMS key to give access to the migration account’s root user. Share the snapshot with the migration account.
To share an encrypted RDS snapshot across AWS accounts, you must first modify the resource-based policy of the KMS key used to encrypt the snapshot to grant the target account permissions to use the key. Then, you can share the manual DB snapshot with the target account. Replicating KMS keys or just sharing without KMS permissions will fail.
Author: Ritesh Yadav
Ultimate access to all questions.
Question #46
A CloudOps engineer wants to share a copy of a production database with a migration account. The production database is hosted on an Amazon RDS DB instance and is encrypted at rest with an AWS Key Management Service (AWS KMS) key that has an alias of production-rds-key.
What must the CloudOps engineer do to meet these requirements with the LEAST administrative overhead?
A
Take a snapshot of the RDS DB instance in the production account. Amend the KMS key policy of the production-rds-key KMS key to give access to the migration account’s root user. Share the snapshot with the migration account.
B
Create an RDS read replica in the migration account. Configure the KMS key policy to replicate the production-rds-key KMS key to the migration account.
C
Take a snapshot of the RDS DB instance in the production account. Share the snapshot with the migration account. In the migration account, create a new KMS key that has an identical alias.
D
Use native database toolsets to export the RDS DB instance to Amazon S3. Create an S3 bucket and an S3 bucket policy for cross-account access between the production account and the migration account. Use native database toolsets to import the database from Amazon S3 to a new RDS DB instance.
No comments yet.