From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Encryption and key management
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Encryption and key management
- [Narrator] Welcome to this lesson on encryption and key management. In this lesson, we'll first talk about fundamentals and best practices of encryption and key management, and then we'll talk about the FIPS 140-3 standard. And then finally, we'll talk about some storage type encryption. So getting into some fundamentals here. We'll first talk about symmetric versus asymmetric encryption. Symmetric encryption uses the same key to both encrypt and decrypt data. So you can see in this little flow diagram here that if we start with our data and then we apply the encryption algorithm, then we get our encrypted data, and then we can take that encrypted data and push it back through the same algorithm and then receive our data back on the other side. And this process can go back and forth through this flow as many times as we want to access either the data or encrypt the data. On the other side of that, we have asymmetric encryption. And with asymmetric encryption, we have two keys. We…
Contents
-
-
-
-
(Locked)
Domain 2 overview48s
-
(Locked)
Cloud data life cycle, data dispersion, and data flows8m 12s
-
(Locked)
Storage types9m 12s
-
Storage threats6m 48s
-
(Locked)
Encryption and key management10m 11s
-
(Locked)
Hashing, data obfuscation, and tokenization9m 8s
-
(Locked)
Data loss prevention, keys, secrets, and certificates9m 35s
-
(Locked)
Different structures of data and data location7m 4s
-
(Locked)
Data classification policies4m 39s
-
(Locked)
Data mapping and labeling3m 59s
-
(Locked)
Information rights management6m 5s
-
(Locked)
Data retention policies7m 52s
-
(Locked)
Data deletion, archiving, and legal hold6m 51s
-
(Locked)
Enable data audit, trace, and accountability7m 40s
-
(Locked)
-
-
-
-