4
Data Protection – Encryption, Key Management, and Data Storage Best Practices
Welcome to the fourth chapter of our in-depth exploration of AWS security. This chapter is dedicated to the critical subject of data protection within AWS, a topic that is indispensable for any organization aiming to secure its assets in the cloud. We will kick off this chapter by delving into AWS encryption mechanisms, focusing on how AWS approaches data-at-rest and data-in-transit encryption. This first part will pave the way for a comprehensive understanding of the types of encryption supported by AWS. We will discuss envelope encryption, symmetric versus asymmetric encryption, and the options of using bring-your-own or AWS-managed keys. As we move forward, the ...
Get Mastering AWS Security - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.