The course is part of these learning pathsSee 4 more
This course explores how to enforce data security measures within the AWS Key Management Service to ensure that the appropriate controls are in place to effectively protect both company and customer data from being accessed by unauthorized parties.
- Understand how you can use Key Policies, IAM policies, and Grants to control access to KMS keys.
- Learn how to create a new KMS Key and edit key policies.
- Learn how a user can delegate temporary permissions to another principal using grants.
Anyone with the responsibility of enforcing data security measures within AWS to ensure that both company and customer data from being accessed by unauthorized parties.
To get the most out of this course, you should have a basic understanding of the AWS Key Management Service and some of the core AWS services. You should also be familiar with the format and syntax of IAM Policies.
Hello and welcome to this course where I shall look at how to secure and manage your AWS KMS keys to ensure you are familiar with some of the best practices when working with encryption to secure and protect your data.
My name is Stuart Scott, and I am the AWS content Director here at Cloud Academy. Feel free to connect with me to ask any questions using the details shown on the screen, alternatively you can always get in touch with us here at Cloud Academy by sending an e-mail to email@example.com where one of our Cloud experts will reply to your question.
This course has been created for those who have the responsibility to enforce data security measures within AWS to ensure that the appropriate controls are in place to effectively protect both company and customer data from being accessed by unauthorized parties.
By the end of this course you will have a greater understanding of how you can use Key Policies, IAM policies, and Grants to control access to KMS keys, how to create a new KMS Key and edit the key policy, and how a user can delegate temporary permissions to another principal using grants.
As a prerequisite, you should have a basic understanding of the AWS Key Management Service and some of the core AWS services. You should also be familiar with the format and syntax of IAM Policies.
Feedback on our courses here at Cloud Academy is valuable to both us as trainers and any students looking to take the same course in the future. If you have any feedback, positive or negative, it would be greatly appreciated if you could contact firstname.lastname@example.org.
Please note that, at the time of writing this content, all course information was accurate. AWS implements hundreds of updates every month as part of its ongoing drive to innovate and enhance its services.
As a result, minor discrepancies may appear in the course content over time. Here at Cloud Academy, we strive to keep our content up to date in order to provide the best training available.
So, if you notice any information that is outdated, please contact email@example.com. This will allow us to update the course during its next release cycle.
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.