December 2017
Intermediate to advanced
410 pages
11h 5m
English
Keeping track of audit trail logs of who has accessed the encryption keys is important. AWS CloudTrail allows logging of AWS KMS API calls related to various activities such as encrypt, decrypt, list, and delete.
You have now understood symmetric key encryption as well as challenges related to protecting the secret key. This can further be secured with the help of CloudHSM or KMS.
There are two important points to remember in terms of data security:
Encryption is one of the useful guards to help you both against external attackers ...
Read now
Unlock full access