From the course: Cloud Security for DevSecOps Engineers: From Security Models to API Protection
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Protecting data with encryption and secrets management
From the course: Cloud Security for DevSecOps Engineers: From Security Models to API Protection
Protecting data with encryption and secrets management
- [Narrator] When you're hosting applications and workloads within the cloud, there's a high chance that you'll need to reference encrypted tokens or credentials for databases or other systems. In this video, we'll be discussing strategies and best practices for encrypting your data and managing your secrets. First, let's define the three key management types, starting with provider-managed encryption keys or PMEKs. PMEKS are the type of keys that the cloud provider manages exclusively. This means that while you use them, they'll manage the underlying infrastructure. This includes things such as key generation, automatic key rotation, key storage, security, and compliance needs, and many others. The thing about these kinds of keys is that they are easy to provision, configure, and use for your application. But if you need to gather metrics or audit the key material, then you're in for a rude awakening. So if you're in a heavily regulated environment, this is not the best type of key…
Contents
-
-
-
-
Risks in public cloud5m 58s
-
(Locked)
Understanding cloud security controls7m 17s
-
(Locked)
Controlling access to cloud resources using IAM7m 37s
-
(Locked)
Protecting data at rest and in transit3m 12s
-
(Locked)
Protecting data with encryption and secrets management6m 13s
-
(Locked)
Logging and monitoring fundamentals5m 7s
-
(Locked)
Network security explained5m 14s
-
(Locked)
Tagging, labels, and governance7m 31s
-
-
-
-