Medium1 markMultiple Choice
Domain 1.4: Multi-Account EnvironmentCloudTrailAthenaKMSSecurity

AWS SAP-C02 · Question 20 · Domain 1.4: Multi-Account Environment

An enterprise has a central logging account where all AWS CloudTrail logs from 100 member accounts are stored in a single S3 bucket. The security team needs to query these logs using Amazon Athena. However, they are encountering KMS decryption errors when Athena tries to read the logs. The S3 bucket is encrypted with an AWS KMS Customer Managed Key (CMK). What is the MOST likely cause of the error?

Answer options:

A.

CloudTrail does not support KMS encryption for organization trails.

B.

The Athena execution role lacks the s3:GetObject permission for the bucket.

C.

The KMS key policy does not grant the Athena execution role the kms:Decrypt permission.

D.

Athena cannot query data encrypted with a Customer Managed Key; it requires an AWS Managed Key.

How to approach this question

Identify the specific permission required to read KMS-encrypted data.

Full Answer

C.The KMS key policy does not grant the Athena execution role the kms:Decrypt permission.✓ Correct
The KMS key policy does not grant the Athena execution role the kms:Decrypt permission.
To read KMS-encrypted data in S3 using Athena, the IAM role executing the query must have both S3 read permissions AND kms:Decrypt permissions in the KMS key policy.

Common mistakes

Assuming S3 permissions are sufficient to read encrypted data.

Practice the full AWS Solutions Architect Professional SAP-C02 Practice Exam 4

75 questions · hints · full answers · grading

More questions from this exam