From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Key management Q&A
From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Key management Q&A
- [Instructor] Here's a question on key management, similar to those that you might find on the CCSP exam. Your organization has most of its computing workloads in an infrastructure as a service environment. You want to use encryption to protect the information stored in that environment, and are looking for a way to manage those keys. What technology would best meet this need? Would you use the same encryption key for all workloads, or would you use the Diffie-Hellman algorithm? Would a hardware security module be the best choice, or would you ask each system administrator to manage their own keys? Let me repeat the question for you. Your organization has most of its computing workloads in an infrastructure as a service environment. You want to use encryption to protect the information stored in that environment, and are looking for a way to manage those keys. What technology would best meet this need? Would you use the same…
Contents
-
-
-
(Locked)
Cloud data storage1m 43s
-
(Locked)
Cloud data storage Q&A1m 27s
-
(Locked)
Encryption2m 7s
-
(Locked)
Encryption Q&A1m 33s
-
(Locked)
Key management1m 54s
-
(Locked)
Key management Q&A1m 46s
-
(Locked)
Public key infrastructure2m 28s
-
(Locked)
Public key infrastructure Q&A1m 32s
-
(Locked)
Cryptographic applications1m 53s
-
(Locked)
Cryptographic applications Q&A1m 20s
-
(Locked)
Data protection1m 52s
-
(Locked)
Data protection Q&A1m 14s
-
(Locked)
Information management2m 52s
-
(Locked)
Information management Q&A1m 4s
-
(Locked)
Data event auditability2m 59s
-
(Locked)
Data event auditability Q&A1m 1s
-
(Locked)
-