When a cloud service provider (CSP) says they are using encryption, that's when you know you need to dig deeper into the details rather than succumb to the Jedi mind tricks of encryption. "You can trust us. We use encryption." We will cover BYOK -- what it actually is - and misconceptions, along with end-to-end encryption. Where do you use encryption? How do you perform encryption?
How do you protect the keys throughout the key management life cycle?
Learning Objectives:
This webcast supports knowledge and concepts from SEC510: Public Cloud Security: AWS, Azure, and GCP