Applying Encryption in Cloud Services
In previous chapters, we covered the fundamental building blocks of cloud services (from compute, storage, and networking services to IAM services, auditing, and threat management).
This chapter will cover various concepts regarding encryption – including the differences between symmetric encryption and asymmetric encryption, key management services (KMSs), secrets management services, and using encryption in transit, at rest, and in use in cloud environments.
Since encryption is a common security best practice that is used to allow data confidentiality, and since many cloud services already have built-in support for encryption (unlike on-premises environments, which require a lot of effort to maintain encryption keys), it is crucial to understand how encryption works and how it is implemented in the various cloud services.
Failing to encrypt sensitive data (such as credit card information, healthcare data, personally identifiable...