A database is running on an Amazon RDS Multi-AZ DB instance. A recent security audit found the database to be out of compliance because it was not encrypted. Which approach will resolve the encryption requirement?
Show Answer & Explanation
Correct Answer: D. Take a snapshot of the RDS instance, copy and encrypt the snapshot, and then restore to the new RDS instance.
Amazon RDS does not support encrypting an existing unencrypted database instance in place—encryption must be enabled at creation time. The only way to encrypt an existing unencrypted RDS instance is to take a snapshot, create an encrypted copy of that snapshot by specifying a KMS key during the copy operation, and then restore a new RDS instance from the encrypted snapshot. After verification, you can update application connection strings to point to the new encrypted instance and delete the old unencrypted one. The first option is incorrect because there is no checkbox in the RDS console to enable encryption on an already-running instance; encryption is immutable after creation. The second option is incorrect because RDS uses managed storage that you cannot directly attach EBS volumes to—RDS abstracts the underlying storage layer. The third option is incorrect because in Multi-AZ deployments, both the primary and standby replicas share the same encryption setting; you cannot have one encrypted and one unencrypted, and standby replicas cannot be independently encrypted. This process requires planning for downtime or using DNS updates to minimize disruption during the migration.