From the course: AWS Certified Solutions Architect - Associate (SAA-C03) Cert Prep (February 2025)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Security services lab

Security services lab

Throughout this course, we've been talking about security quite a bit. We've looked at IAM and seen how you create users groups and roles. We've talked about network access control lists and security groups and many security technologies. At one point, we even talked about how you can use a PEM file in order to authenticate into AWS. And remember, we converted that PEM file to a PPK file because we were actually using a common tool called PuTTY that doesn't support PEM files, but it supports PPK files. And at that point, we talked about the fact that it might be a good idea to rotate your keys periodically so that you're not using the same keys forever. That way you have better security if those files get exposed or something. Well, in this episode, we want to look at that and a few other things related to security. So we're going to talk about the Key Management Services Or KMS. We're also going to…

Contents