Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
AWS Certified Security – Specialty (SCS-C02) Exam Guide - Second Edition

You're reading from  AWS Certified Security – Specialty (SCS-C02) Exam Guide - Second Edition

Product type Book
Published in Apr 2024
Publisher Packt
ISBN-13 9781837633982
Pages 614 pages
Edition 2nd Edition
Languages
Authors (2):
Adam Book Adam Book
Profile icon Adam Book
Stuart Scott Stuart Scott
Profile icon Stuart Scott
View More author details

Table of Contents (29) Chapters

Preface 1. Section 1: AWS Security Fundamentals
2. Chapter 1: AWS Shared Responsibility Model 3. Chapter 2: Fundamental AWS Services 4. Chapter 3: Understanding Attacks on Cloud Environments 5. Section 2: Incident Response
6. Chapter 4: Incident Response 7. Chapter 5: Managing Your Environment with AWS Config 8. Chapter 6: Event Management with Security Hub and GuardDuty 9. Section 3: Logging and Monitoring
10. Chapter 7: Logs Generated by AWS Services 11. Chapter 8: CloudWatch and CloudWatch Metrics 12. Chapter 9: Parsing Logs and Events with AWS Native Tools 13. Section 4: Infrastructure Security
14. Chapter 10: Configuring Infrastructure Security 15. Chapter 11: Securing EC2 Instances 16. Chapter 12: Managing Key Infrastructure 17. Chapter 13: Access Management 18. Section 5: Identity and Access Management
19. Chapter 14: Working with Access Policies 20. Chapter 15: Federated and Mobile Access 21. Chapter 16: Using Active Directory Services to Manage Access 22. Section 6: Data Protection
23. Chapter 17: Protecting Data in Flight and at Rest 24. Chapter 18: Securely Connecting to Your AWS Environment 25. Chapter 19: Using Certificates and Certificate Services in AWS 26. Chapter 20: Managing Secrets Securely in AWS 27. Chapter 21: Accessing the Online Practice Resources 28. Other Books You May Enjoy

Data Encryption Introduction

Several factors govern the increased emphasis on data encryption in recent times. One such significant factor is the need for compliance with industry-specific regulations that your company must adhere to. Additionally, internal compliance governance may also require data encryption as a mandatory measure. Furthermore, adopting encryption can be a proactive approach to enhancing security by introducing an extra layer of protection to your environment. Regardless of the specific driver or reason, the ultimate objective remains the same—to establish a more secure platform for your customers with effective data protection.

In order to achieve the ultimate goal of encryption, it is important to limit unauthorized physical and logical access to data.

There are three states that data can reside in and that you will need to be aware of when looking at data and encryption:

  • Data in transit: This is the transfer of data between devices, networks...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}