Summary
In this chapter, we went over the details of Cloud KMS, its supported operations, and how to use them. We also looked at bringing your own encryption key to the cloud. We went over advanced options such as Cloud HSM and Cloud EKM. In addition to this, we saw the best practices and Cloud KMS infrastructure decisions while setting up your project on Google Cloud. As a security engineer, you should be able to define the right architecture for key management for your organization and recommend the right compliance options for project teams.
In the next chapter, we will look at data security, specifically how to use Google Cloud’s Data Loss Prevention (DLP) services. Cloud KMS and DLP should bring you one step closer to creating the right strategy for data security.