Overview
Syllabus
Data Protection at AWS
Network Protections Architecture is key • VPC Layout can nake or break your security • Protection cones in layers
Encryption at Rest Key Managenent Service (KMS) • Centrallzed Key Management • Built-In to Many Services • Generate keys or bring your own • For additional regulatory compltance, you can get a dedicated
Encryption in Transit Certificates
Secrets Management Remember: If someone has the password or key, encryption doesn't matter! • Vaults
Storage Architecture General Tips for Protecting your Data • Beware the Blast Radius O Production is Sacred
Taught by
ChariotSolutions