You need to implement an encryption-at-rest strategy that protects sensitive data and reduces key management complexity for non-sensitive data. Your solution has the following requirements:
✑ Schedule key rotation for sensitive data.
✑ Control which region the encryption keys for sensitive data are stored in.
✑ Minimize the latency to access encryption keys for both sensitive and non-sensitive data.
What should you do?
GHOST1985
Highly Voted 2 years, 3 months agoGHOST1985
2 years, 2 months agomarmar11111
Highly Voted 2 years, 1 month agoadb4007
11 months agoshayke
Most Recent 1 year, 11 months agoTonytheTiger
2 years, 1 month agoAzureDP900
2 years, 1 month agococo10k
2 years, 1 month agoAwesomeGCP
2 years, 2 months agoGHOST1985
2 years, 2 months agoadb4007
11 months ago