You need to implement an encryption-at-rest strategy that protects sensitive data and reduces key management complexity for non-sensitive data. Your solution has the following requirements:
✑ Schedule key rotation for sensitive data.
✑ Control which region the encryption keys for sensitive data are stored in.
✑ Minimize the latency to access encryption keys for both sensitive and non-sensitive data.
What should you do?
GHOST1985
Highly Voted 2 years, 1 month agoGHOST1985
2 years agomarmar11111
Highly Voted 1 year, 11 months agoadb4007
9 months, 2 weeks agoshayke
Most Recent 1 year, 10 months agoTonytheTiger
1 year, 11 months agoAzureDP900
1 year, 12 months agococo10k
2 years agoAwesomeGCP
2 years agoGHOST1985
2 years agoadb4007
9 months, 2 weeks ago