A company must encrypt all AMIs that the company shares across accounts. A DevOps engineer has access to a source account where an unencrypted custom AMI has been built. The DevOps engineer also has access to a target account where an Amazon EC2 Auto Scaling group will launch EC2 instances from the AMI. The DevOps engineer must share the AMI with the target account. The company has created an AWS Key Management Service (AWS KMS) key in the source account. Which additional steps should the DevOps engineer perform to meet the requirements? (Choose three.)
Show Answer & Explanation
Correct Answers: A. In the source account, copy the unencrypted AMI to an encrypted AMI. Specify the KMS key in the copy action.; D. In the source account, modify the key policy to give the target account permissions to create a grant. In the target account, create a KMS grant that delegates permissions to the Auto Scaling group service-linked role.; F. In the source account, share the encrypted AMI with the target account
Why these are correct: A: You must copy the unencrypted AMI to create an encrypted version, specifying the KMS key from the source account. This creates an encrypted AMI that can be shared. D: The key policy must grant the target account permissions to create a grant, and the target account must create a KMS grant that delegates permissions to the Auto Scaling group service-linked role. This allows the Auto Scaling group to use the encrypted AMI and decrypt the EBS volumes. F: You must share the encrypted AMI (not the unencrypted one) with the target account so it can launch instances from it. Why other options are wrong: B: Using the default EBS encryption key won't work for cross-account sharing because the default key cannot be shared across accounts. You must use a customer-managed KMS key. C: Creating the grant in the source account for the target account's service-linked role is insufficient. The target account needs permissions to create the grant itself. E: Sharing the unencrypted AMI doesn't meet the encryption requirement.