This is a dedicated watch page for a single video.
A Security Engineer has been tasked with the job of configuring access control and authentication for the AWS KMS keys of a particular AWS account. Which of the following would you identify as valid points of consideration for configuring the requirement correctly? (Select two)