A company is collecting IAM CloudTrail log data from multiple IAM accounts by managing individual trails in each account and forwarding log data to a centralized Amazon S3 bucket residing in a log archive account. After CloudTrail introduced support for IAM Organizations trails, the company decided to further centralize management and automate deployment of the CloudTrail logging capability across all of its IAM accounts.
The company's security engineer created an IAM Organizations trail in the master account, enabled server-side encryption with IAM KMS managed keys (SSE-KMS) for the log files, and specified the same bucket as the storage location. However, the engineer noticed that logs recorded by the new trail were not delivered to the bucket.
Which factors could cause this issue? (Select TWO.)
- The CMK key policy does not allow CloudTrail to make encrypt and decrypt API calls against the key.
- The CMK key policy does not allow CloudTrail to make GenerateDataKey API calls against the key.
- The IAM role used by the CloudTrail trail does not have permissions to make PutObject API calls against a folder created for the Organizations trail.
- The S3 bucket policy does not allow CloudTrail to make PutObject API calls against a folder created for the Organizations trail.
- The CMK key policy does not allow the IAM role used by the CloudTrail trail to use the key for crypto graphicaI operations.
Reveal Solution Next Question