From the course: Cloud Security for DevSecOps Engineers: From Security Models to API Protection

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Protecting data with encryption and secrets management

Protecting data with encryption and secrets management

- [Narrator] When you're hosting applications and workloads within the cloud, there's a high chance that you'll need to reference encrypted tokens or credentials for databases or other systems. In this video, we'll be discussing strategies and best practices for encrypting your data and managing your secrets. First, let's define the three key management types, starting with provider-managed encryption keys or PMEKs. PMEKS are the type of keys that the cloud provider manages exclusively. This means that while you use them, they'll manage the underlying infrastructure. This includes things such as key generation, automatic key rotation, key storage, security, and compliance needs, and many others. The thing about these kinds of keys is that they are easy to provision, configure, and use for your application. But if you need to gather metrics or audit the key material, then you're in for a rude awakening. So if you're in a heavily regulated environment, this is not the best type of key…

Contents