What is the MOST secure way for the company to share the database with the auditor?
Create a read replica of the database. Configure IAM standard database authentication to grant the auditor access.
Export the database contents to text files. Store the files in an Amazon S3 bucket. Create a new IAM user for the auditor. Grant the user access to the S3 bucket.
Copy a snapshot of the database to an Amazon S3 bucket. Create an IAM user. Share the user’s keys with the auditor to grant access to the object in the S3 bucket.
Create an encrypted snapshot of the database. Share the snapshot with the auditor. Allow access to the AWS Key Management Service (AWS KMS) encryption key.
Explanations:
Creating a read replica does not provide a separate copy of the database; it replicates the existing database within the same AWS account. Moreover, IAM standard database authentication may not be sufficient for security and access control, especially since the database is in a private subnet.
Exporting the database contents to text files and storing them in S3 may expose sensitive data if not properly secured. While it allows access through IAM, it does not provide the auditor with a full database copy or maintain data integrity.
Copying a snapshot of the database to S3 and sharing IAM user keys does not adequately secure the data. The snapshot is not directly accessible via S3, and sharing IAM user keys is risky, potentially exposing the auditor to security vulnerabilities.
Creating an encrypted snapshot of the database and sharing it with the auditor is the most secure method. This ensures data is encrypted both at rest and in transit. Access to the AWS KMS encryption key can be controlled, allowing the auditor to access the snapshot securely while maintaining the confidentiality and integrity of the data.