How should the SysOps administrator accomplish this goal?

1 Comment

  1. James
    Author

    I opine that the answer is:
    Take a snapshot of the unencrypted instance. Create an encrypted copy of the snapshot with the KMS key. Restore the instance from the encrypted snapshot.

Leave a Reply

Your email address will not be published. Required fields are marked *

20 + nine =