A developer is building an application that stores sensitive data files in an Amazon S3 bucket. Company security policies require that files be encrypted by using AWS KMS keys. An application in a second AWS account must access the files.
Which combination of solutions will meet these requirements? (Select THREE.)
Submit