Summary
In this chapter, you reviewed the different approaches to protecting data at rest and in transit. You examined the different processes of encrypting EBS volumes in their various states. This included creating a new encrypted EBS volume, creating an encrypted volume from an unencrypted snapshot, and even changing the current key on a volume. You then moved on to the block storage service offered by Amazon S3 and saw the different ways to protect data using this service, including using the Object Lock and legal hold features.
In Chapter 18, you will explore how users can securely connect to your Amazon environment. This includes creating secure connections for your organization so that the chances of data being captured in transit are minimized. You will also learn how to implement good practices for your users so that they can connect to your environment in a safe and secure manner.