Overview
Syllabus
Intro
Don't Just Focus on Perimeter Security
Tamper proof Central key repository Can also store Certs (Private Keys)
Once a key goes in the Key Vault, it never comes out again
Keys vs Secrets
Configuration as Secrets
Local Key Wrapping
Insurers Pll data encrypted using their own keys
Key Versioning
Password Protection
Salted Hash Passwords
Good practice to use different HMAC / Vault Keys for different roles, it Admin, internal employee, customers etc.
A digital is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document
Data Breaches are Inevitable
Taught by
NDC Conferences