AWS Certified Solutions Architect Professional SAP-C02 Practice Question
A financial services company uses a 10 Gbps AWS Direct Connect connection for hybrid connectivity between its on-premises data center and a central networking VPC. A new compliance requirement mandates encryption for all data in transit traversing this link. The solution must provide line-rate encryption with minimal performance overhead and integrate natively with the existing high-speed connection. Which approach should a solutions architect recommend?
Establish an AWS Site-to-Site VPN connection over a public virtual interface (VIF) on the Direct Connect connection. Route traffic from on-premises to the VPC over the encrypted IPsec tunnel.
Enforce application-level encryption using TLS for all communication. Use AWS Certificate Manager (ACM) Private Certificate Authority to issue and manage certificates for all internal clients and servers.
Deploy an AWS Network Firewall into the path of the Direct Connect traffic flow and configure stateful rules to only allow encrypted protocols like SSH and HTTPS.
Configure the Direct Connect connection to use MACsec (IEEE 802.1AE) security. Work with the network provider to enable MACsec on the on-premises and AWS-side equipment to encrypt traffic at Layer 2.
The correct answer is to use MACsec (Media Access Control Security). MACsec is an IEEE 802.1AE standard that provides Layer 2 encryption for Direct Connect dedicated connections at 10 Gbps and 100 Gbps speeds. It offers line-rate encryption with minimal performance impact because it is implemented in hardware, making it the ideal solution for high-throughput, latency-sensitive workloads that require encryption over a Direct Connect link.
An AWS Site-to-Site VPN over a public VIF is a valid method to encrypt traffic over Direct Connect, but it is not the most performant solution for a 10 Gbps link. IPsec VPNs introduce significant overhead due to packet encapsulation and encryption processes, and a single VPN tunnel is limited to a maximum throughput of 1.25 Gbps. While multiple tunnels can be aggregated, achieving full 10 Gbps line-rate performance is difficult and complex.
Enforcing application-level encryption with TLS is a good security practice but does not meet the requirement of encrypting all traffic traversing the link, as it only protects traffic from applications configured to use it. It introduces considerable operational overhead to implement and manage universally across all applications and services. This approach does not encrypt the link itself.
AWS Network Firewall is a managed service used to filter and inspect network traffic. While it can enforce policies on encrypted traffic (like allowing only TLS 1.3), its function is not to provide end-to-end encryption for the Direct Connect link itself. It acts as a firewall, not a link encryption mechanism.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is MACsec and how does it work in AWS Direct Connect?
Open an interactive chat with Bash
How does a Site-to-Site VPN work with AWS Direct Connect, and why is it less performant than MACsec?
Open an interactive chat with Bash
Why is TLS not sufficient for encrypting all traffic over a Direct Connect link?
Open an interactive chat with Bash
AWS Certified Solutions Architect Professional SAP-C02
Design for New Solutions
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access