Chapter 8. How to Secure Communication and Storage
In Chapter 7, you learned about the role networking plays in security, including the importance of private networks, bastion hosts, VPCs, and service meshes. But what happens if a malicious actor finds a way to intercept the data you transmit over the network? Or what if they manage to get access to that data when you write it to a hard drive? Networking provides one important layer of defense, but as you also saw in Chapter 7, you need multiple layers so you’re never one mistake away from disaster (defense in depth). In this chapter, you’ll learn about two more layers of defense:
- Secure storage
-
Protect your data from unauthorized snooping or interference by using encryption at rest, secrets management, password storage, and key management.
- Secure communication
-
Protect your communication over the network from unauthorized snooping or interference by using encryption in transit and secure transport protocols.
As you go through these topics, this chapter will walk you through hands-on examples, including how to encrypt data with AES and RSA; verify file integrity with SHA-256, HMAC, and digital signatures; store secrets in AWS Secrets Manager; and serve traffic over HTTPS by using TLS certificates from Let’s Encrypt. But first, let’s do a quick primer on what makes all of this possible: cryptography.
Cryptography Primer
Cryptography is the study of how to protect data from adversaries so as to provide three key benefits, ...