Introduction to Encryption on AWS and KMS
Security is paramount when you plan to host and access your application in the cloud. In Chapter 2, Securing Access with AWS Identity and Access Management, you discovered the importance of authentication and authorization. Later, in Chapter 4, Building Private Networks in the Cloud with Amazon VPC, you learned about network security and measures to ensure that only specific traffic related to our application was permitted. In this section, you will learn about data encryption and services on AWS that can help ensure your data isn’t readable to anyone who does not have authorization to view the data. This is a critical component of your overall security design.
The following are two types of encryption methodologies that you need to be aware of when working with data:
- Encryption in transit – This refers to encrypted data en route between network endpoints. It may be stored unencrypted on a disk.
- Encryption at rest...