April 2024
Intermediate to advanced
614 pages
14h 25m
English
Encrypting your data may be the most critical of all the security measures you take in your environment. Once data is encrypted, only those with authorization to use the key that decrypts the data may access those files and pieces of information to read and view their contents.
As a security professional, you are often the one that others in the organization come to with questions on how to facilitate data encryption using the company’s standards. This is why it’s essential that you are familiar with the workings of Key Management Service (KMS) and the API calls that encompass this service.
Throughout this chapter, you will gain basic knowledge of encryption and a substantial understanding of the services that ...
Read now
Unlock full access