From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Encryption and key management

Encryption and key management

- [Narrator] Welcome to this lesson on encryption and key management. In this lesson, we'll first talk about fundamentals and best practices of encryption and key management, and then we'll talk about the FIPS 140-3 standard. And then finally, we'll talk about some storage type encryption. So getting into some fundamentals here. We'll first talk about symmetric versus asymmetric encryption. Symmetric encryption uses the same key to both encrypt and decrypt data. So you can see in this little flow diagram here that if we start with our data and then we apply the encryption algorithm, then we get our encrypted data, and then we can take that encrypted data and push it back through the same algorithm and then receive our data back on the other side. And this process can go back and forth through this flow as many times as we want to access either the data or encrypt the data. On the other side of that, we have asymmetric encryption. And with asymmetric encryption, we have two keys. We…

Contents