Encrypting Data with AWS KMS

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ม.ค. 2025

ความคิดเห็น • 24

  • @EnlearAcademy
    @EnlearAcademy  4 ปีที่แล้ว +1

    Thanks for watching! If you like this content we need your support to grow our channel. Please subscribe and share it with your friends. If you have any suggestions, please share with us too 🙂

    • @user-bv6il2nk4t
      @user-bv6il2nk4t 3 ปีที่แล้ว

      topics not taught onLy , JSON VERY BASIC MEANING , NETW0RKING FOR AWS LIKE IP PORT IP AND PORT FORWARDING CIDR FORMULA RANGE HOW MANY RANGE SUBNET BASIC NETWORKING PLAYLIST RRACERUTE AND NETSTAT LIKE 3-4 HOURS PLAYLIST NETWORKING FOR CLOUD FIREWALL BASICS STATEFUL STATELESS , PLAYLIST FPE LOG AND TROUBESHOOTNG LIUX. NO PROPER VEDIO ON MAKING MASTER SLAVE HOE BACKUP AND INCREMENTAL BACUKP DB PERFONA ETC ,SESSION LOCK HOW , HOW BACKUP WITHUT LOCK TABLES , VERY IMP AWS SECURITY CERTIFCIATION SERIES MISSING IN TH-cam .

  • @juliovargas5008
    @juliovargas5008 6 หลายเดือนก่อน

    I really like how you are clear and straight to the point. I just subscribed to your channel. Thank you for what you do!

  • @Bibhaw
    @Bibhaw 2 หลายเดือนก่อน +1

    well explained. thank you :)

  • @spiralni
    @spiralni 3 ปีที่แล้ว +1

    wow. clear like water. thanks

  • @jasper5016
    @jasper5016 ปีที่แล้ว +1

    This is so useful. Thanks

  • @stepseiventures2528
    @stepseiventures2528 4 ปีที่แล้ว +2

    Manoj, In your very first video on KMS Demo you mentioned KMS for RDS or Redshift. But I haven't seen any of those videos in the next as you say in ending your videos. Kindly show me which video has that. However, thank you very much for all that you're doing. Love your explanations.

  • @servicedeskca7428
    @servicedeskca7428 4 ปีที่แล้ว

    Nailed it BRo!

  • @PerfactlyImperfact
    @PerfactlyImperfact 3 ปีที่แล้ว

    Very nice bro. 👌

  • @AkshayKasar-bn9lb
    @AkshayKasar-bn9lb 2 ปีที่แล้ว

    Very Nice

  • @DcarsforU
    @DcarsforU 2 ปีที่แล้ว

    perfect video

  • @stepseiventures2528
    @stepseiventures2528 4 ปีที่แล้ว

    concise explanation. Good job

  • @andreelyusef3235
    @andreelyusef3235 3 ปีที่แล้ว

    excellent video sir!

  • @ankireddy5483
    @ankireddy5483 5 ปีที่แล้ว

    Suprb explanation bro ,make more videos realtime base ...and blogs

  • @teamhhh1
    @teamhhh1 4 ปีที่แล้ว

    Well explained sir!!!!

  • @viswateja1659
    @viswateja1659 4 ปีที่แล้ว +1

    Ur Way of explaining is too good and blog URLs what u shared they were not working.

  • @ievgengavrysh5831
    @ievgengavrysh5831 2 ปีที่แล้ว

    Why somebody cannot:
    1. Steal the Encrypted Data Key
    2. Go to KMS, present stolen Encrypted Data key, and get Plaintext Data Key
    3. Use Plaintext Data Key and decrypt the encrypted data?
    The same way the resoning behind "not storing Plaintext Data Key cos somebody can steal" it was done...
    What is the benefit of adding extra layer of roundtrip to KMS and how it protects from getting Plaintext Data Key?

    • @benapo8399
      @benapo8399 4 หลายเดือนก่อน

      I come up with the same question. But then I thought about how will the hacker enter the KMS? You store the credentials of the KMS API on your environment. So basically what I am saying is it might be just the authentication. Dont know tho

    • @benapo8399
      @benapo8399 4 หลายเดือนก่อน

      my other question is couldnt the hacker open the dev tools and get the plaintext data key which can be used for decrypt the encrypted data?

  • @merlinshaji2247
    @merlinshaji2247 2 ปีที่แล้ว

    the document is not opening..

  • @hirenbhatt9808
    @hirenbhatt9808 3 ปีที่แล้ว

    derivation error,, due to openssl versions conflic,,

  • @ifteqarahmed6306
    @ifteqarahmed6306 3 ปีที่แล้ว

    404 i get for blog link

  • @user-hy6dd6en9l
    @user-hy6dd6en9l 2 ปีที่แล้ว

    strong accent and low volume