How should the SysOps administrator accomplish this goal?

1 Comment

  1. James
    Author

    I opine that the answer is:
    Take a snapshot of the unencrypted instance. Create an encrypted copy of the snapshot with the KMS key. Restore the instance from the encrypted snapshot.

Leave a Reply to James Cancel reply

Your email address will not be published. Required fields are marked *

sixteen − fifteen =