Skip to content
Identity and Access Management – Securing Users, Roles, and Policies – Microsoft AWS
Close Button
  • Contact Us

Category: Certifications of Microsoft

Comparison – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 February, 2022 Kennedy Kincaid 0 Comments 4 categories

Comparison To provide a clearer perspective on the choices available, the following table (Table 4.1) compares SSE and CSE side-by-side with BYOK and AWS-managed keys options, highlighting the benefits and limitations of each possibility:  BYOKsAWS-Managed…

Read More

Key features – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 December, 2021 Kennedy Kincaid 0 Comments 4 categories

Key features Here are some of the most relevant features of the AWS Encryption SDK: Data key caching: One of the standout features of the SDK is its ability to cache data keys. This means…

Read More

Example – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 October, 2021 Kennedy Kincaid 0 Comments 4 categories

Example Imagine a healthcare application that stores patient records. Given the sensitive nature of health data, it is imperative to ensure that this data is encrypted both when stored and when transmitted between the application…

Read More

Managing cryptographic keys – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 September, 2021 Kennedy Kincaid 0 Comments 4 categories

Managing cryptographic keys While encryption is the process of converting data into a code to prevent unauthorized access, the keys used in this process are the linchpin. Without secure and efficient key management, even the…

Read More

KMS in-depth overview – Data Protection – Encryption, Key Management, and Data Storage Best Practices

17 July, 2021 Kennedy Kincaid 0 Comments 5 categories

KMS in-depth overview KMS is a fully managed service that makes it easy to create and control cryptographic keys within AWS, which can then be used to encrypt and decrypt data and sign and verify…

Read More

Key policies and access management – Data Protection – Encryption, Key Management, and Data Storage Best Practices

16 May, 2021 Kennedy Kincaid 0 Comments 5 categories

Key policies and access management Key policies in KMS are JSON documents that define who has what kind of access to a specific key. Let’s explore some advanced access management techniques. Cross-account access KMS allows…

Read More

Best practices for KMS – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 April, 2021 Kennedy Kincaid 0 Comments 5 categories

Best practices for KMS Here are some guidelines to maximize the security and efficiency of using KMS: Access control: Adhere to the principle of least privilege. Limit access to keys to only those who need…

Read More

Integration with KMS – Data Protection – Encryption, Key Management, and Data Storage Best Practices

10 February, 2021 Kennedy Kincaid 0 Comments 6 categories

Integration with KMS One of the most compelling features of CloudHSM is its seamless integration with KMS, which allows you to create a custom key store backed by your CloudHSM cluster. This integration enables you…

Read More

Best practices for CloudHSM – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 January, 2021 Kennedy Kincaid 0 Comments 3 categories

Best practices for CloudHSM Here are some guidelines to ensure the security and efficiency of CloudHSM: Access control: Just as with KMS, implement the principle of least privilege. Ensure that only authorized personnel can perform…

Read More

Posts pagination

Previous page Page 1 Page 2 Page 3

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • November 2022
  • September 2022
  • July 2022
  • May 2022
  • March 2022
  • February 2022
  • December 2021
  • October 2021
  • September 2021
  • July 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021

Categories

  • Advanced IAM policy use cases
  • Best practices for KMS
  • Certifications of Microsoft
  • Data protection in key AWS services
  • Managing cryptographic keys
  • Microsoft AWS Exams

Copyright © 2024 realwe.org