Securing Data with AWS Key Management Service (KMS)

Securing Data with AWS Key Management Service (KMS)
Securing Data with AWS Key Management Service (KMS)

CLOUD LABS



Securing Data with AWS Key Management Service (KMS)

In this lab, you’ll enforce encryption across EBS, S3, and DynamoDB using a customer-managed KMS key to design and validate a secure AWS architecture. This challenge-based exercise is designed for hands-on practice; step-by-step instructions will not be provided.

1 Task

beginner

1hr

Certificate of Completion

Desktop OnlyDevice is not compatible.
No Setup Required
Amazon Web Services

Technologies
KMS
EBS logoEBS
S3 logoS3
DynamoDB logoDynamoDB
Cloud Lab Overview

AWS Key Management Service (KMS) is a fully managed service that makes it easy to create and control encryption keys to encrypt your data. In this Challenge Cloud Lab, you will work hands-on with a customer-managed KMS key (CMK) to enforce encryption across multiple AWS services, EBS, S3, and DynamoDB. This ensures data is protected both in transit and at rest.

Rather than walking through each step, this Challenge Cloud Lab tests your ability to design, configure, and validate a robust encryption architecture. You must prove that only principals with appropriate KMS permissions can attach or read encrypted EBS volumes, perform dual-layer S3 encryption, and scan a DynamoDB table encrypted under your CMK.

The following is the high-level architecture diagram of the infrastructure that you’ll create in this challenge:

High-level architecture of KMS-based encryption for cloud resources
High-level architecture of KMS-based encryption for cloud resources

AWS services that you’ll be tested on:

  • AWS Key Management Service (KMS)

  • Amazon Elastic Block Store (EBS)

  • Amazon Simple Storage Service (S3)

  • Amazon DynamoDB

Cloud Lab Tasks
Implement a Secure Data Encryption Architecture Using AWS KMS
Labs Rules Apply
Stay within resource usage requirements.
Do not engage in cryptocurrency mining.
Do not engage in or encourage activity that is illegal.

Relevant Course

Use the following content to review prerequisites or explore specific concepts in detail.

Hear what others have to say
Join 1.4 million developers working at companies like