From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Key management Q&A

Key management Q&A

From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review

Start my 1-month free trial

Key management Q&A

- [Instructor] Here's a question on key management, similar to those that you might find on the CCSP exam. Your organization has most of its computing workloads in an infrastructure as a service environment. You want to use encryption to protect the information stored in that environment, and are looking for a way to manage those keys. What technology would best meet this need? Would you use the same encryption key for all workloads, or would you use the Diffie-Hellman algorithm? Would a hardware security module be the best choice, or would you ask each system administrator to manage their own keys? Let me repeat the question for you. Your organization has most of its computing workloads in an infrastructure as a service environment. You want to use encryption to protect the information stored in that environment, and are looking for a way to manage those keys. What technology would best meet this need? Would you use the same…

Contents