Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- Demystifying KMS keys operations, bring your own key (BYOK), custom key store, and ciphertext portability, by Arthur Mnev (2021): https://aws.amazon.com/blogs/security/demystifying-kms-keys-operations-bring-your-own-key-byok-custom-key-store-and-ciphertext-portability/
- Top 10 security best practices for securing backups in AWS, by Ibukun Oyewumi (2022): https://aws.amazon.com/blogs/security/top-10-security-best-practices-for-securing-backups-in-aws/
- AWS KMS Encryption: Server-Side Encryption for Data in AWS, by NetApp (2022): https://bluexp.netapp.com/blog/aws-cvo-blg-aws-kms-encryption-server-side-encryption-for-data-in-aws
- Encryption fundamentals with AWS KMS and CloudHSM, by Graham Thompson (2021): https://intrinsecsecurity.com/blog/cloud-security/encryption-fundamentals-with-aws-kms-and-cloudhsm/
- NIST FIPS 140-2 Non-Proprietary Security...