In this video, learn how to work with Cloud KMS for encryption.
but for file security in general, … more and more of my customers … are needing to work with … and Google's advances in this area are significant. … So, if this is a requirement, … I recommend you read this documentation … around secret management with Cloud KMS. … "Cloud KMS does not directly store secrets. … So, what does this look like? … Key rings are the top level … and I've created several of them here … just to show you some of the differences. … You can use the default key … you can create a key that Google manages, … or you can supply your own key. … for symmetric encryption and decryption. … So, at this point, we're going to copy the resource ID, … then I'm going to create a bucket and call it demo_with _key. … Accept the default settings. … rather than accepting the Google-managed key, … I'm going to switch to the customer-managed key. … so let me make sure I have the right ID copied here. … and I click Create. …
- Enterprise concerns
- Enterprise scenarios
- Setting up your organization’s account
- Managing billing
- Enterprise compute services
- Enterprise storage and database services
- Enterprise data pipelines
- GCP developer and DevOps tools
Skill Level Intermediate
Working with cloud services1m 13s
1. GCP for the Enterprise
2. Enterprise Setup and Security
3. Enterprise Compute
4. Enterprise Storage and Database
5. Enterprise Data Pipelines
6. Dev and DevOps Tools
Next steps1m 20s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.