KMS, Encryption SDK, SSM Parameter Store, IAM & STS Flashcards

1
Q

What is server-side encryption?

A

Data is encrypted after being received by the server and decrypted before sending. Data is stored encrypted using a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is client-side encryption?

A

Data is encrypted on the client side and never decrypted by AWS. Only the client can decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Envelope Encryption?

A

A data key is used to encrypt the data, and that key is itself encrypted using a master key (like KMS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is AWS KMS?

A

A fully managed service that lets you create and control encryption keys to encrypt your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is KMS integrated into AWS?

A

It’s natively integrated with services like S3, EBS, RDS, Lambda, CloudTrail, and many more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can KMS API be used directly?

A

Via SDK or CLI using operations like Encrypt, Decrypt, GenerateDataKey, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of KMS keys?

A

Symmetric (AES-256) and Asymmetric (RSA/ECC) key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can you download the private key of a KMS asymmetric key?

A

❌ No — only the public key is downloadable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are AWS-owned vs. AWS-managed KMS keys?

A

AWS-owned keys are used by default and free. AWS-managed keys are per service (e.g., aws/rds) and also free.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are customer-managed KMS keys?

A

Keys created and fully controlled by the user. Support rotation, auditing, access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a KMS key policy?

A

To define who can use or administer the KMS key (similar to an IAM policy).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens if no custom KMS policy is provided?

A

A default policy gives full access to the root user of the AWS account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you allow cross-account access with KMS?

A

By adding a custom KMS key policy that grants access to the other account’s principal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When should you use GenerateDataKey API?

A

When you need to encrypt data > 4KB, for example in envelope encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does GenerateDataKey return?

A

A plaintext data key and a copy encrypted with the KMS key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is GenerateDataKeyWithoutPlaintext used for?

A

Generates a data encryption key (DEK) but does not return the plaintext key—only the encrypted version.

17
Q

What is GenerateRandom used for in KMS?

A

Returns secure random bytes for use in salts, nonces, or tokens.

18
Q

What happens if KMS request quota is exceeded?

A

You receive a ThrottlingException — use exponential backoff.

19
Q

How can you reduce KMS API calls?

A

Use data key caching (via the Encryption SDK) or S3 bucket keys

20
Q

What is an S3 bucket key?

A

A bucket-level data key that reduces the number of KMS API calls when using SSE-KMS.

21
Q

What is the benefit of using an S3 bucket key?

A

Reduces KMS usage/cost by up to 99% when encrypting large volumes in S3

22
Q

What is AWS CloudHSM?

A

A hardware security module where you manage your own encryption keys on dedicated hardware.

23
Q

How is CloudHSM different from KMS?

A

CloudHSM provides full key control; KMS is managed by AWS.

24
Q

What compliance level does CloudHSM meet?

A

FIPS 140-2 Level 3 compliance

25
What is AWS SSM Parameter Store?
A secure storage for config values and secrets, optionally encrypted with KMS.
26
What is AWS Secrets Manager?
A managed secrets service with built-in rotation, auditing, and mandatory encryption using KMS.
27
When should you use Secrets Manager over SSM?
When you need automatic secret rotation, especially with RDS credentials.
28
Can Secrets Manager secrets be accessed via SSM?
Yes, using /aws/reference/secretsmanager/secret-id path
29
What are CloudFormation dynamic references?
Allow referencing SSM/SecretsManager values at stack deploy time.
30
What are the types of dynamic references?
ssm, ssm-secure, secretsmanager.
31
How should you handle secrets in CodeBuild?
Use env vars that reference SSM Parameter Store or Secrets Manager — not plaintext.
32
Does CodeBuild support VPC access?
Yes, with a VPC configuration
33
What are AWS Nitro Enclaves?
Isolated compute environments for processing sensitive data (no external access).
34
Can Nitro Enclaves access the internet?
No — no external networking or persistent storage.
35
How do Nitro Enclaves integrate with KMS?
KMS integration for Nitro Enclaves, which allows enclaves to perform secure cryptographic operations without the private key ever leaving KMS.