A company uses Amazon EC2 instances to host frontend services behind an Application Load Balancer. Amazon Elastic Block Store (Amazon EBS) volumes are attached to the EC2 instances. The company uses Amazon S3 buckets to store large files for images and music.
The company has implemented a security architecture oit>AWS to prevent, identify, and isolate potential ransomware attacks. The company now wants to further reduce risk.
A security engineer must develop a disaster recovery solution that can recover to normal operations if an attacker bypasses preventive and detective controls. The solution must meet an RPO of 1 hour.
Which solution will meet these requirements?
To ensure minimal latency and regional availability of secrets, encrypting secrets in us-east-1 with a customer-managed KMS key and then replicating them to us-west-1 for encryption with the same key is the optimal approach. This method leverages customer-managed KMS keys for enhanced control and ensures that secrets are available in both regions, adhering to disaster recovery principles and minimizing latency by using regional endpoints.
Kerry
3 months agoRonnie
3 months agoBernardo
3 months agoBulah
4 months agoCatherin
4 months agoSena
4 months agoKimberlie
4 months agoLonna
4 months agoHillary
5 months agoKristeen
5 months agoAnastacia
5 months agoShizue
5 months agoFrancisca
5 months agoCorinne
5 months agoKrystal
5 months agoGlen
5 months agoTrinidad
5 months agoRasheeda
5 months agoSherrell
5 months agoLeoma
5 months agoClorinda
10 months agoClarinda
9 months agoMarkus
9 months agoCordelia
10 months agoEarnestine
10 months agoAlba
10 months agoShantay
9 months agoWeldon
9 months agoAnthony
9 months agoChara
11 months agoJess
11 months agoCyril
11 months agoLourdes
9 months agoRoosevelt
9 months agoMicheal
9 months agoMari
10 months agoMari
11 months ago