Question: You are configuring a CMK using the KMS service console. Which permissions you should define and configure in the JSON security policy? ( Choose three.

You are configuring a CMK using the KMS service console. Which permissions you should
define and configure in the JSON security policy? (Choose three.)
A. The IAM groups that can read the key
B. IAM users that can be the CMK administrators
C. IAM roles that can be the CMK administrators
D. The application pool that will access the CMK
E. IAM roles that can use the CMK
F. The asymmetric algorithms that can be used
G. The Cognito pool that will be used to authenticate the user to read the keys
A
B
C
D
E
F
G
 You are configuring a CMK using the KMS service console. Which

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!