Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You are configuring a CMK using the KMS service console. Which permissions you should define and configure in the JSON security policy? ( Choose three.
You are configuring a CMK using the KMS service console. Which permissions you should define and configure in the JSON security policy? Choose three. A The IAM groups that can read the key B IAM users that can be the CMK administrators C IAM roles that can be the CMK administrators D The application pool that will access the CMK E IAM roles that can use the CMK F The asymmetric algorithms that can be used G The Cognito pool that will be used to authenticate the user to read the keys A B C D G
You are configuring a CMK using the KMS service console. Which permissions you should
define and configure in the JSON security policy? Choose three.
A The IAM groups that can read the key
B IAM users that can be the CMK administrators
C IAM roles that can be the CMK administrators
D The application pool that will access the CMK
E IAM roles that can use the CMK
F The asymmetric algorithms that can be used
G The Cognito pool that will be used to authenticate the user to read the keys
A
B
C
D
G
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started