Summary
In this chapter, we focused on the various encryption alternatives based on AWS, Azure, and GCP.
We began by introducing the concepts of encryption (symmetric and asymmetric algorithms). We continued by introducing the best practices for using KMSs (access control, auditing, and monitoring). Then, we started talking about secrets management services (access control, auditing, and monitoring). Finally, we introduced confidential computing in the cloud.
Throughout this chapter, we discussed encryption at different stages of the data lifecycle, and we concluded with a short section about encryption in use. Following the shared responsibility model, customers can use their encryption keys, which increases their ability to control the data that is stored in the cloud.
Data needs to be protected at all stages:
- Encryption in transit: Allows us to protect data as it passes a network
- Encryption at rest: Allows us to protect data as it is persistently stored (on...