“Which combination of steps should the security engineer take in the incident account to complete the sharing operation?

1 Comment

  1. Bryan
    Author

    As I understand it, the answer is:
    Create an AWS Key Management Service (AWS KMS) customer managed key. Copy the snapshot of the suspicious EBS volume. Encrypt the copy of the snapshot by using the new KMS key.

Leave a Reply

Your email address will not be published. Required fields are marked *

two × 2 =