AWS Security Basics - AWS KMS, Client/Server Side Encryption, CMK, Data Key, Real World Use | Demo

แชร์
ฝัง
  • เผยแพร่เมื่อ 31 ม.ค. 2025

ความคิดเห็น • 95

  • @SpaceeManJones
    @SpaceeManJones 5 ปีที่แล้ว +8

    Awesome overview, thank you!

    • @cloudwithraj
      @cloudwithraj  5 ปีที่แล้ว

      Ty SpaceeManJones for the kind words, I am so glad you found this video useful. Feel free to check out other videos in my channel when your time permits. Thanks again.

  • @Awachit1
    @Awachit1 4 ปีที่แล้ว +1

    I don't understand why this channel is not in AWS mainstream learning channel suggestions.
    Thank you Raj, video was very helpful.

  • @nastusalmander
    @nastusalmander 2 หลายเดือนก่อน +1

    This video very engaging and informative. Thank you!

    • @cloudwithraj
      @cloudwithraj  หลายเดือนก่อน

      Glad you enjoyed it!

  • @spyl42
    @spyl42 5 ปีที่แล้ว +3

    Excellent Tutorial. Cleared away the mystery surrounding KMS. Also, enjoyed your delivery. Made it fun to watch/listen.

    • @cloudwithraj
      @cloudwithraj  5 ปีที่แล้ว

      Very kind of you John. Really appreciate the positive feedback!

  • @kalyanchatterjee8003
    @kalyanchatterjee8003 4 ปีที่แล้ว +3

    Best video on the subject. This cleared up a lot of confusion. Thank you!

  • @Amsterdam125
    @Amsterdam125 4 ปีที่แล้ว +3

    Nicely done presentation with good energy, thank you. I appreciate the demo, which patiently went into proving how the encryption keys prevent access into encrypted files.

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      Thanks for the kind words! I am so happy you found this video useful. Stay safe and healthy.

  • @viveksharma5884
    @viveksharma5884 3 ปีที่แล้ว

    @Raja - Great effort and witty as always...Please edit comment you can "delete" KMS Managed AWS key at 4:32. Best of luck.

  • @glennadams7047
    @glennadams7047 3 ปีที่แล้ว

    The best video I've found on the subject. THANKS !!!

  • @aireddy
    @aireddy 3 ปีที่แล้ว

    Raj , It is easy to understand KMS , great job!

  • @himanshugta1724
    @himanshugta1724 11 หลายเดือนก่อน

    thanks for the simple, yet crisp explanation!!

    • @cloudwithraj
      @cloudwithraj  11 หลายเดือนก่อน

      Glad it was helpful!

  • @NithyashreeCM
    @NithyashreeCM 7 หลายเดือนก่อน +1

    Nice Explanation...Thank you👍

  • @TheKaushal8686
    @TheKaushal8686 4 ปีที่แล้ว

    To the point , and real-life applications. Thanks for the videos...Appreciate your efforts.

  • @shashikantdivekar7839
    @shashikantdivekar7839 3 ปีที่แล้ว

    Quality video. Very useful. Thank you very much.

  • @gauravjand
    @gauravjand 5 ปีที่แล้ว +5

    Awesome video. Really helped in clearing the KMS Mystery!!
    After watching this excellent video, I got a question in mind. when you applied KMS on a file, the user who was not having access(Bob) to KMS key could not access the file. This could have been done by ACL properties as well, why did we use KMS key? I thought KMS is actually used to encrypt the data and not to control the access. Would appreciate your response.

    • @cloudwithraj
      @cloudwithraj  5 ปีที่แล้ว +6

      Appreciate the kind words Gaurav! Regarding SCL and KMS - ACL for VPC can be used for granular access using IP. However for enterprises, often one account/VPC is shared by multiple groups. In those cases, KMS is easier to segregate different apps. Also KMS gets integrated in IAM policy so you can do lot of funky conditions there (based on prefix, wildcard etc.), ACLs are pretty strict and can't do different conditions like IAM policies. Lastly for ACLs, if IP address changes you have to redo those, however for KMS you can use alias and even if the key material rotates, the policy need not change. Apologies for the long answer, hope this helps clarify your doubt.

  • @tahasaleh4697
    @tahasaleh4697 4 ปีที่แล้ว +1

    Great video! I really loved how you eased into KMS

  • @sujeetkumar.
    @sujeetkumar. 3 ปีที่แล้ว

    Superb explanation

  • @satya4866
    @satya4866 4 ปีที่แล้ว

    Nice video Raj... Pls do more .. you explain complicated stuff simply... Thank you

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      Thanks for the kind words, I will try my best. Thanks for watching

  • @regon1982ss
    @regon1982ss 4 ปีที่แล้ว +2

    Thank you so much for the videos, they are really helping and motivating me in my SAA studies. Please keep on smashing it by sending awesome videos!! :)

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      Thanks Supriya for watching :). I am glad you found it helpful. I am making "How to Architect" video in next couple weeks which you will find helpful for SAA. Thanks again for kind words and support.

  • @sseerangan
    @sseerangan 4 ปีที่แล้ว +1

    Nicely explained with demo. keep doing more videos please..

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      Thanks Sami for the kind words! Check out my channel for other videos when you have a moment. Thanks again!

  • @theycallmeken
    @theycallmeken 4 ปีที่แล้ว

    Dude your energy is awesome! First video I seen from you, looking forward to the rest!!

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      I appreciate that! Thanks for watching!

  • @danchisholm1
    @danchisholm1 5 หลายเดือนก่อน

    thanks raj 🎉❤

  • @aadinathrakshe2852
    @aadinathrakshe2852 4 ปีที่แล้ว

    Simply Excellent!
    I just would like to know in one case, if we have a bucket with images and video serving publicly and we do not want that someone should steal it quietly. Thanks

  • @saltdomeguy
    @saltdomeguy 3 ปีที่แล้ว

    Good explanation

  • @RamKumar-tk2cb
    @RamKumar-tk2cb 3 ปีที่แล้ว

    Love you man.... you have an awesome personality :)

  • @christianibiri
    @christianibiri 2 ปีที่แล้ว

    Excellent, it is always good refresh these concepts :)

  • @jazzburnett9877
    @jazzburnett9877 4 ปีที่แล้ว +1

    Thank You! An Overview well explained, Sir !

  • @nathanhan2089
    @nathanhan2089 ปีที่แล้ว

    thanks for demystifying KMS for me...

  • @James-mv9qx
    @James-mv9qx 4 ปีที่แล้ว

    Good on ya mate, very clear and concise explanation, cheers

  • @hippo50410
    @hippo50410 4 ปีที่แล้ว

    It's perfect :) Short, concise, useful

  • @youtubeDaddy525
    @youtubeDaddy525 4 ปีที่แล้ว

    Great video ! Very clear and informative !

  • @lakshravi364
    @lakshravi364 4 ปีที่แล้ว

    simple and good.

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      Glad you liked it, thanks for watching

  • @Abbyjuh
    @Abbyjuh 3 ปีที่แล้ว

    Any videos for data in transit?

  • @saratvenkat2170
    @saratvenkat2170 3 ปีที่แล้ว

    Hey, its a nice video. Quick question, if AWS managed keys are used to encrypt files in S3, can I still control the access using IAM policies as I don't see the same option of "key users" in KMS. If that can be controlled in a different way, what is the advantage of using customer managed keys other than having control of key management? Thanks in advance.

  • @mikkid8271
    @mikkid8271 3 ปีที่แล้ว

    how does s3 take care about the data keys? where are the encrypted data keys for an encrypted file with that key stored? can i see the data key for a specific file see? do you have any infos about that? thank you a lot!!!!

  • @ankeshgaikwad7936
    @ankeshgaikwad7936 4 ปีที่แล้ว +2

    Hello sir,
    Your tutorials are very helpful thank you so much. But i have a little bit of a different scenario.
    Scenario:
    I have an .mp4 file in S3 bucket(private)
    I'm using Elastic Transcoder to convert that video in different resolutions and same time encrypting those files using SSE-KMS and storing back to S3
    Finally to access Private content I'm using CloudFront with Signed URL.
    Problem:
    How to decrypt those media files?
    If i do not encrypt files while transcoding, the whole scenario above mentioned is working properly.
    Thank you for giving time to read this.
    Hoping to hear from you soon

  • @benedictsimpson6953
    @benedictsimpson6953 4 ปีที่แล้ว

    very nice

  • @deepalisingh5660
    @deepalisingh5660 4 ปีที่แล้ว

    Great work Sir

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      Thanks Deepali for the kind words.

  • @kareemsharawi4778
    @kareemsharawi4778 4 ปีที่แล้ว

    Another awesome video!

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว +1

      Glad you enjoyed it! Thanks for watching!

  • @diegoramos27
    @diegoramos27 2 ปีที่แล้ว

    Hi Sir does KMS use a HSM behind the scenes always? if that is so why is there AWS CloudHSM? Thanks

  • @MrDoublethumb
    @MrDoublethumb 4 ปีที่แล้ว

    Super koo! session

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      Thanks T.K for the kind words!

  • @ravindrabhatt
    @ravindrabhatt 4 ปีที่แล้ว

    Do you have some video for all encryption options in S3, S3 SSE vs S3 SSE-KMS and S3 API settings etc

  • @saluja1986
    @saluja1986 4 ปีที่แล้ว

    Very Nice. But I have some confusion. Where is encryption and decryption, It was just restricting the rights on that particular file that can be done by bucket policy as well or by other means. Please clarify this.

  • @bwhelan237
    @bwhelan237 3 ปีที่แล้ว

    Thanks for the review

  • @rakeshms
    @rakeshms 4 ปีที่แล้ว

    nicely explained.

  • @hebronspiritualmessages9382
    @hebronspiritualmessages9382 3 ปีที่แล้ว

    We can achieve s3 file access control using bucket policies and Acl's rite.. 🤔

  • @1970mcgraw
    @1970mcgraw 4 ปีที่แล้ว

    Excellent, thank you

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว +1

      Thanks Mike, glad to hear you found the video useful.

  • @rajeevsinha2632
    @rajeevsinha2632 5 ปีที่แล้ว

    Good one sir, very informative... Thank you .

    • @cloudwithraj
      @cloudwithraj  5 ปีที่แล้ว

      Ty Rajeev for your kind words! Have a great weekend.

  • @satyasantosh3143
    @satyasantosh3143 4 ปีที่แล้ว

    Great Explanation!

  • @sanaasalam6473
    @sanaasalam6473 2 ปีที่แล้ว

    I wanna do a project on CLIENT-SIDE CRYPTOGRAPHY BASED SECURITY FOR CLOUD COMPUTING SYSTEM. Using AWS for this is costly. Sir ,In which cloud can I implement this one without much expense?.. Could you please suggest me an idea?

  • @Brand73
    @Brand73 5 ปีที่แล้ว +3

    10:00

  • @kvishnuteja334
    @kvishnuteja334 3 ปีที่แล้ว

    Hi Raj. Nice video. one quick question .. from the example the policy restriction itself is enough to allow / deny read/download of file. If the user is not permitted to read file he is of course is restricted to read contents of it at the first level. Then decrypting is something as next step is obviously not reached. Can you please shed light on point of encryption in this scenario?

  • @francisantony12
    @francisantony12 หลายเดือนก่อน

    If the data ( file ) is encrypted by a data key, and the CMK is used to encrypt the data key, where is teh data key stored ? ( Does KMS create a paired [ inaccessible to the customers] data key whenever it kreates a CMK ? )

  • @viveksharma5884
    @viveksharma5884 4 ปีที่แล้ว

    Rajdeep, buckets are private by default. How can bob see the bucket ?

  • @preetbenipal1034
    @preetbenipal1034 4 ปีที่แล้ว

    thank you ...love you :)

  • @abnagb2514
    @abnagb2514 4 ปีที่แล้ว

    it will be fun

  • @owenouzheng9537
    @owenouzheng9537 4 ปีที่แล้ว +1

    Are u working at Amazon office at U.S? Which city?

    • @cloudwithraj
      @cloudwithraj  4 ปีที่แล้ว

      Yes sir. Used to be in NYC office, now home office of course :)

  • @aiyubkhan8523
    @aiyubkhan8523 4 ปีที่แล้ว +1

    yes , I can access the kms encrypted object via iam permission . then i click open option I can view my object .
    but here after 300 second it will be expire ???? why. please let me know

  • @bigheartsmolpen
    @bigheartsmolpen 4 ปีที่แล้ว

    I like your lipstick 🌸

  • @theinnoverse
    @theinnoverse 2 ปีที่แล้ว

    I'm slightly confused here, I understood the encryption part, but doubt is when one user tried to access file from another account he wasn't able to do, I'm kinda confused because the same access permissions can be specified in bucket policies, can anyone help me out?

  • @pratikmbm1990
    @pratikmbm1990 4 ปีที่แล้ว

    Using CMK we can just encrypt data which is less than 4kb in size, in my case I have tried to upload 1 mb of file using AWS:KMS onto s3, and able to do so, how come? Internally is it using data-keys to achieve the same?

  • @vara62
    @vara62 3 ปีที่แล้ว

    demo starts at 7:24

  • @erickray777
    @erickray777 4 ปีที่แล้ว

    Please update the title. There is no demonstration of client side encryption. Please provide a link if you have produced such. Thanks!

  • @amirkazemi2517
    @amirkazemi2517 3 ปีที่แล้ว

    BAAAAAAACK!

  • @SogMosee
    @SogMosee 4 ปีที่แล้ว

    Okay, so the keys dont actually encrypt the data, as in they dont ever modify the contents of the file, they just essentially stop people who dont have decrypt permissions for the key from opening the file.
    Or are the file contents actually encrypted in gibberish behind the scenes, but then once someone with key tries to open the file, it decrypts the contents from gibberish into the original file content?

  • @mianadnanfakhar.6968
    @mianadnanfakhar.6968 3 ปีที่แล้ว

    Sir itny okhy ku ho rhy hain

  • @AnkurPatelankur
    @AnkurPatelankur 5 ปีที่แล้ว

    Another Kumar sanu

    • @cloudwithraj
      @cloudwithraj  5 ปีที่แล้ว

      Only if I had melodic voice like Sanuda, I would bust into songs every video 😉

  • @Betelgeusewaitforit
    @Betelgeusewaitforit 3 ปีที่แล้ว

    Dude just fall back to your native accent.. but great coverage of features.