Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

6.3.4. Multi-Region Key and Certificate Management

First Principle: Global applications require encryption keys and certificates that work across Regions. Without multi-Region key management, cross-Region data access requires complex key-sharing arrangements or data re-encryption at Region boundaries.

This is new content for the SCS-C03.
KMS Multi-Region Keys:
  • Create a primary key in one Region and replica keys in other Regions
  • Same key ID and key material across all Regions — data encrypted in one Region can be decrypted in another
  • Use case: cross-Region disaster recovery, global database encryption, multi-Region application encryption
  • Replica keys are independent — usable even if primary Region is unavailable
AWS Private Certificate Authority (Private CA):
  • Issue private X.509 certificates for internal resources
  • Certificates for mTLS, code signing, IoT device identity, VPN authentication
  • Supports certificate hierarchies: root CA → subordinate CA → end-entity certificates
  • Cross-Region: Share the CA across Regions using RAM (Resource Access Manager)
  • Integrates with ACM for certificate deployment to ALB, CloudFront, API Gateway
AWS Certificate Manager (ACM):
  • Free public certificates (auto-renewed) for ALB, CloudFront, API Gateway
  • Cannot export public certificates — only usable with integrated AWS services
  • Private certificates (via Private CA integration) can be exported and used on EC2
NeedSolution
Public HTTPS for ALB/CloudFrontACM public certificates (free, auto-renew)
Private mTLS between servicesPrivate CA + ACM private certificates
Cross-Region encryption with same keyKMS multi-Region keys
IoT device authenticationPrivate CA certificates
On-premises workload certificatesPrivate CA + export via ACM

⚠️ Exam Trap: ACM public certificates cannot be exported. If a question requires installing a certificate on an EC2 instance, you need either a Private CA certificate or an imported certificate — not ACM public.

Scenario: A company runs a global application with databases in us-east-1 and eu-west-1. Cross-Region replication requires data encrypted in one Region to be readable in the other. You create a KMS multi-Region key with primary in us-east-1 and replica in eu-west-1. Data encrypted with either key is decryptable by both.

Reflection Question: How do multi-Region KMS keys simplify cross-Region disaster recovery compared to traditional approaches of re-encrypting data at Region boundaries?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications