Data Protection at AWS - Securing Cloud Applications

Data Protection at AWS - Securing Cloud Applications

ChariotSolutions via YouTube Direct link

Encryption at Rest Key Managenent Service (KMS) • Centrallzed Key Management • Built-In to Many Services • Generate keys or bring your own • For additional regulatory compltance, you can get a dedica…

3 of 6

3 of 6

Encryption at Rest Key Managenent Service (KMS) • Centrallzed Key Management • Built-In to Many Services • Generate keys or bring your own • For additional regulatory compltance, you can get a dedica…

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Data Protection at AWS - Securing Cloud Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Data Protection at AWS
  2. 2 Network Protections Architecture is key • VPC Layout can nake or break your security • Protection cones in layers
  3. 3 Encryption at Rest Key Managenent Service (KMS) • Centrallzed Key Management • Built-In to Many Services • Generate keys or bring your own • For additional regulatory compltance, you can get a dedica…
  4. 4 Encryption in Transit Certificates
  5. 5 Secrets Management Remember: If someone has the password or key, encryption doesn't matter! • Vaults
  6. 6 Storage Architecture General Tips for Protecting your Data • Beware the Blast Radius O Production is Sacred

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.