Which statement correctly describes how encryption at rest works for an AWS RDS instance?
Think about what 'at rest' means in terms of data storage.
Encryption at rest means data stored on disk and backups are encrypted using AWS KMS keys. It does not encrypt data in transit or require manual encryption.
You want to allow only EC2 instances in a specific security group to access your RDS instance. Which security group rule should you add to the RDS security group?
Consider the default port for MySQL and the direction of traffic for database access.
RDS instances require inbound rules allowing the database port (e.g., 3306 for MySQL) from the EC2 security group. SSH (port 22) or UDP are incorrect.
You have an RDS instance in a private subnet inside a VPC. You want to allow access only from a web server in a public subnet. Which architecture and security group setup is best?
Think about subnet types and limiting exposure of the database.
RDS should be in a private subnet without public IP. Access is controlled by security groups allowing only the web server's security group on the database port. Public IP or open internet access is insecure.
You enabled encryption for your RDS instance using a customer-managed AWS KMS key. What happens if you delete this KMS key?
Consider the role of the KMS key in decrypting data at rest.
Deleting the customer-managed KMS key makes the encrypted data inaccessible because the key is required to decrypt data at rest. AWS does not automatically switch keys or decrypt data.
An RDS security group has two inbound rules: one allows TCP port 5432 from 10.0.0.0/24, and another allows TCP port 5432 from security group sg-12345. An EC2 instance with security group sg-12345 and IP 10.0.1.10 tries to connect on port 5432. What is the outcome?
Remember how security group rules are evaluated in AWS.
Security group rules are evaluated with OR logic. If any rule allows the traffic, it is permitted. The EC2 instance's security group matches one rule, so connection is allowed despite IP being outside the CIDR range.