AWS Certified Data Engineer Associate DEA-C01 Practice Question
An industrial IoT platform collects sensitive telemetry on edge devices and uploads the data to an Amazon S3 bucket. A compliance mandate states that neither plaintext data nor encryption keys may ever leave the devices or be visible to AWS services. Each device can perform symmetric encryption but should remain simple to operate. Which approach best satisfies the compliance requirement while minimizing operational overhead?
Stream the telemetry unencrypted into Amazon Kinesis Data Firehose and enable encryption with an AWS managed KMS key before delivery to S3.
Upload the data to the S3 bucket with server-side encryption using a customer-managed AWS KMS key (SSE-KMS).
Use the AWS Encryption SDK on each device to perform client-side encryption and upload the resulting ciphertext object to S3 with no server-side encryption setting.
Include a customer-provided encryption key in each PUT request so the bucket uses server-side encryption with customer-provided keys (SSE-C).
With client-side encryption, the edge device encrypts the data locally and retains full control of the encryption keys. Only ciphertext is transmitted to and stored in Amazon S3, so AWS never sees either the plaintext or the keys-meeting the mandate. Enabling SSE-KMS or SSE-C is a server-side solution: the object arrives at S3 unencrypted (or the key is sent with the request), meaning AWS has temporary access to the plaintext or the key. Encrypting later in Kinesis Data Firehose also exposes the plaintext in transit to AWS. Therefore, client-side encryption performed on each device and uploading the resulting ciphertext without any S3 server-side encryption enabled is the only compliant option.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is client-side encryption and why is it used in this scenario?
Open an interactive chat with Bash
How does the AWS Encryption SDK support client-side encryption?
Open an interactive chat with Bash
Why are server-side encryption options like SSE-KMS or SSE-C non-compliant in this situation?
Open an interactive chat with Bash
What is client-side encryption in AWS Encryption SDK?
Open an interactive chat with Bash
How does client-side encryption differ from server-side encryption in AWS?
Open an interactive chat with Bash
Why is SSE-KMS or SSE-C not suitable for compliance mandates requiring no plaintext exposure to AWS?
Open an interactive chat with Bash
AWS Certified Data Engineer Associate DEA-C01
Data Security and Governance
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .