mediummultiple choiceObjective-mapped

A microservice reads a secret from AWS Secrets Manager using its task role (ServiceRole). The secret is configured to use a customer-managed CMK. In production, the service fails with AccessDeniedException on GetSecretValue. CloudTrail shows that Secrets Manager attempted kms:Decrypt but was denied. Which IAM policy change is most appropriate to fix the failure while keeping least privilege?

Question 1mediummultiple choice
Full question →

A microservice reads a secret from AWS Secrets Manager using its task role (ServiceRole). The secret is configured to use a customer-managed CMK. In production, the service fails with AccessDeniedException on GetSecretValue. CloudTrail shows that Secrets Manager attempted kms:Decrypt but was denied. Which IAM policy change is most appropriate to fix the failure while keeping least privilege?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Add kms:Decrypt permission for the specific CMK ARN to ServiceRole, and also keep secretsmanager:GetSecretValue for the specific secret ARN.

The failure is due to kms:Decrypt being denied. Granting decrypt on the specific CMK and limiting Secrets Manager access to the exact secret preserves least-privilege while allowing Secrets Manager’s decryption step.

B

Distractor review

Add secretsmanager:ListSecrets permission on "*" so the service can discover the secret and retry the read.

ListSecrets addresses discovery, not decryption. The CloudTrail evidence indicates kms:Decrypt was denied, so this would not resolve the root cause.

C

Distractor review

Add s3:GetObject permission to ServiceRole for the KMS key alias stored in an S3 bucket.

Secrets Manager uses KMS for cryptographic operations; it does not require S3 GetObject permissions for the CMK. This is unrelated to the reported kms:Decrypt denial.

D

Distractor review

Add kms:Encrypt permission instead of kms:Decrypt, because the service only needs to read the secret.

Encrypt is the opposite operation. Reading a Secrets Manager value requires decrypting the stored ciphertext, so kms:Decrypt is the correct missing permission.

Common exam trap

Common exam trap: authentication is not authorization

Logging in proves the user can authenticate. It does not automatically mean the user is allowed to enter privileged or configuration mode. Watch for AAA authorization, privilege level and command authorization details.

Technical deep dive

How to think about this question

This kind of question is testing the difference between identity and permission. A user may successfully log in to a router because authentication is working, but still fail to enter configuration mode because authorization is missing, misconfigured or mapped to a lower privilege level.

KKey Concepts to Remember

  • Authentication checks who the user is.
  • Authorization controls what the user is allowed to do after login.
  • Privilege levels affect access to EXEC and configuration commands.
  • AAA, TACACS+ and RADIUS can separate login success from command access.

TExam Day Tips

  • Do not assume successful login means full administrative access.
  • Look for words such as cannot enter configuration mode, privilege level, authorization or command access.
  • Separate login problems from permission problems before choosing the answer.

Related practice questions

Related SAA-C03 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SAA-C03 question test?

Authentication checks who the user is.

What is the correct answer to this question?

The correct answer is: Add kms:Decrypt permission for the specific CMK ARN to ServiceRole, and also keep secretsmanager:GetSecretValue for the specific secret ARN. — Because the CloudTrail entry shows Secrets Manager attempted kms:Decrypt and was denied, the task role must have KMS permissions to allow decryption using the specific CMK that protects the secret. The least-privilege fix is to grant kms:Decrypt on the CMK ARN used by that secret and ensure secretsmanager:GetSecretValue is scoped to only the required secret ARN. This allows Secrets Manager to decrypt the secret value while avoiding broad permissions like ListSecrets or wildcard KMS access. Option B adds discovery permissions but does not address the kms:Decrypt denial, so the service would still fail to decrypt. Option C is unrelated to Secrets Manager’s decryption path and does not correspond to the CloudTrail evidence. Option D grants kms:Encrypt, which cannot decrypt stored ciphertext; reads will continue to fail. Only A targets the exact missing kms:Decrypt permission on the relevant CMK.

What should I do if I get this SAA-C03 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.