Which steps should the solutions architect take to meet these requirements?

1 Comment

  1. Margaret
    Author

    If I’m not mistaken, the answer is:
    Create a CMK in AWS KMS with no key material and an origin of EXTERNAL. Import the key material generated from the on-premises HSMs into the CMK using the public key and import token provided by AWS. Configure a bucket policy on the logging bucket that disallows uploads of non-encrypted data and requires that the encryption source be AWS KMS.

Leave a Reply

Your email address will not be published. Required fields are marked *

four + 5 =