Summary
In this chapter, we focused on the various encryption alternatives based on AWS, Azure, and GCP.
We began by introducing the concepts of encryption (symmetric and asymmetric algorithms). We continued by introducing the best practices for using KMSes (access control, auditing, and monitoring). Then, we started talking about secrets management services (access control, auditing, and monitoring).
Throughout this chapter, we had a long discussion about encryption in transit and encryption at rest, and we concluded with a short conversation about encryption in use. Following the shared responsibility model, customers can use their own encryption keys, which increases their ability to control the data that's stored in the cloud.
Knowing about the available options for encryption will allow you to choose the most suitable solution for each service you are using in the cloud.
In the next chapter, we will review common security threats to cloud computing (data breaches...