12

Managing Key Infrastructure

Encrypting your data may be the most critical of all the security measures you take in your environment. Once data is encrypted, only those with authorization to use the key that decrypts the data may access those files and pieces of information to read and view their contents.

As a security professional, you are often the one that others in the organization come to with questions on how to facilitate data encryption using the company’s standards. This is why it’s essential that you are familiar with the workings of Key Management Service (KMS) and the API calls that encompass this service.

Throughout this chapter, you will gain basic knowledge of encryption and a substantial understanding of the services that ...

Get AWS Certified Security – Specialty (SCS-C02) Exam Guide - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.