You need to implement an encryption-at-rest strategy that protects sensitive data and reduces key management complexity for non-sensitive data. Your solution has the following requirements:
✑ Schedule key rotation for sensitive data.
✑ Control which region the encryption keys for sensitive data are stored in.
✑ Minimize the latency to access encryption keys for both sensitive and non-sensitive data.
What should you do?
GHOST1985
Highly Voted 2 years, 5 months agoGHOST1985
2 years, 4 months agomarmar11111
Highly Voted 2 years, 3 months agoadb4007
1 year agoshayke
Most Recent 2 years, 1 month agoTonytheTiger
2 years, 2 months agoAzureDP900
2 years, 3 months agococo10k
2 years, 3 months agoAwesomeGCP
2 years, 4 months agoGHOST1985
2 years, 4 months agoadb4007
1 year ago