Question: You are configuring a CMK using the KMS service console. Which permissions you should define and configure in the JSON security policy? ( Choose three.
You are configuring a CMK using the KMS service console. Which permissions you should
define and configure in the JSON security policy? Choose three.
A The IAM groups that can read the key
B IAM users that can be the CMK administrators
C IAM roles that can be the CMK administrators
D The application pool that will access the CMK
E IAM roles that can use the CMK
F The asymmetric algorithms that can be used
G The Cognito pool that will be used to authenticate the user to read the keys
A
B
C
D
G
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
