Certified Security - Specialty

Sign Up Free or Log In to participate!

AWS KMS Policy

Can someone help me with question below? Choose 2

{

“Effect”: “Allow”

“Principal”: {“AWS”: “arn:aws:iam::111122223333:root”),

“Action”: “kms:*”;

“Resource”: “*”

}

A. The policy allows access for the AWS account 111122223333 to manage key access though IAM policies.

B. The policy allows all IAM users in account 111122223333 to have full access to the KMS key.

C. The policy allows the root user in account 111122223333 to have full access to the KMS key.

D. The policy allows the KMS service-linked role in account 111122223333 to have full access to the KMS key.

E. The policy allows all IAM roles in account 111122223333 to have full access to the KMS key.

4 Answers

This example enables IAM policies. This means that if this is in place as part of your key’s policy, you can then use IAM policies to give IAM users and roles in the account access to the CMK (A). By default it also enables the root user of account 111122223333 access (C).

Best answer is:

A and C

I really like this re:Invent 2017 video: https://www.youtube.com/watch?v=X1eZjXQ55ec

Explanation of this policy begins at 22:56. Delegates all KMS actions to IAM.

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?