Managing Key Infrastructure
Encrypting your data may be the most critical of all the security measures you take in your environment. Once data is encrypted, only those with authorization to use the key that decrypts the data may access those files and pieces of information to read and view their contents.
As a security professional, you are often the one that others in the organization come to with questions on how to facilitate data encryption using the company’s standards. This is why it’s essential that you are familiar with the workings of Key Management Service (KMS) and the API calls that encompass this service.
Throughout this chapter, you will gain basic knowledge of encryption and a substantial understanding of the services that manage and provide encryption for AWS accounts and environments. This will allow you to manage, rotate, and protect encryption keys and ensure that data is being encrypted.
Note
With the AWS Certified Security Specialty exam...