Summary and Quiz
Summarize what you’ve learned in the security, monitoring, and troubleshooting chapter and test yourself with a simple quiz.
Let’s summarize what we have learned in this chapter.
Encryption
Data protection is as crucial as writing performant and reliable code in cloud-native applications.
We learned about two main types of encryption:
Symmetric encryption: This method uses a single key to encrypt and decrypt data.
Asymmetric encryption: This method generates a public key for encryption and a corresponding private key for decryption.
Regarding data states, data at rest (data stored) is encrypted using keys, while data in transit (data moving across networks) is secured using SSL/TLS certificates.
AWS Key Management Service (KMS)
AWS provides a centralized managed repository for encryption keys called the Key Management Service (KMS). KMS offers three types of encryption keys:
Customer-managed keys: With these keys, AWS provides the repository, but customers manage the key creation, rotation, and policies.
AWS managed keys: AWS handles the provisioning and management of these keys, though we can modify their ...