Network Protections Architecture is key • VPC Layout can nake or break your security • Protection cones in layers
3
Encryption at Rest Key Managenent Service (KMS) • Centrallzed Key Management • Built-In to Many Services • Generate keys or bring your own • For additional regulatory compltance, you can get a dedica…
4
Encryption in Transit Certificates
5
Secrets Management Remember: If someone has the password or key, encryption doesn't matter! • Vaults
6
Storage Architecture General Tips for Protecting your Data • Beware the Blast Radius O Production is Sacred
Description:
Explore data protection strategies for AWS-based applications in this informative 28-minute conference talk by Steven Pressman, President & Chief Solutions Architect at Alpine Cyber Solutions. Learn crucial design and implementation decisions to safeguard your data in AWS, focusing on network protection architecture, encryption at rest and in transit, key management, secrets management, and storage architecture. Discover real-life examples of potential security pitfalls and gain valuable insights on maintaining data safety throughout development and operations cycles. Understand the importance of VPC layout, protection layers, and the AWS Key Management Service (KMS) for centralized key management and regulatory compliance. Acquire general tips for protecting your data, including being mindful of the blast radius and treating production environments as sacred.
Data Protection at AWS - Securing Cloud Applications