Summary
In this chapter, you looked at the leading service for encrypting data at rest in AWS, Key Management Service, or KMS. You were given a basic introduction to encryption, and the difference between symmetric and asymmetric encryption keys was explained. You learned all about the major components of the KMS service: customer-managed keys, data encryption keys, key material, key policies, and grants.
You saw how the AWS Artifact service can help you check the compliance of the KMS keys you are using and the compliance of other services. You also learned how AWS Artifact is a self-service document repository that can help you with auditing or if you need to look up something that could be found in the customer agreement.
In Chapter 13, Access Management, you will review a new section regarding IAM. This section will begin with access management and discuss how you can allow users access to your systems natively with the IAM service, along with creating groups of users.
...