A developer is building an application that stores sensitive data files in an Amazon S3 bucket. Company security policies require that files be encrypted by using AWS KMS keys . An application in a second AWS account must access the files.
Which combination of solutions will meet these requirements? (Select THREE.)
Submit