This lab walks you through the AWS KMS, AWS S3 and AWS CloudTrail. You will create a custom encryption key using KMS and use it to encrypt objects S3 Bucket and configure CloudTrail to watch S3 events.
Duration: 50 minutes
AWS Region: US East (N. Virginia) us-east-1
A lot of companies today need the ability to simply and securely collect, store, and analyze their data at a massive scale.
Amazon S3 is an object storage built to store and retrieve any amount of data from anywhere be it Websites, Mobile applications, Commercial applications, and data from IoT sensors or devices.
It is designed to deliver 99.999999999% durability and stores data for millions of applications.
Amazon S3 provides comprehensive security with Server-Side Encryption, Customer-Side Encryption, Bucket policies and ACLs.
AWS KMS is a managed service that makes it easy for us to create and control the encryption keys used to encrypt our data, and uses Hardware Security Modules (a hardware used for encryption keys) to protect the security of our keys.
AWS KMS is integrated with several other AWS services to help us protect the data we store while working with these services.
AWS KMS is also integrated with AWS CloudTrail to provide us with the logs of all key usage to help us meet our regulatory and compliance needs.
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account.
With CloudTrail, we can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure.
CloudTrail provides a history of all events and API calls made within our AWS account, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services.
This event history helps us with security analysis, resource change tracking, and troubleshooting.
Whenever a service or resource has been deleted accidentally, the first place we go and look at is AWS CloudTrail.
Login into the AWS Management Console.
Create a customer managed KMS key.
Create an S3 bucket.
Create a CloudTrail and configure it to store events in S3.
Uploading an object and encrypting it.
Accessing the encrypted object.
Monitoring KMS activity using CloudTrail Logs.
Deleting AWS Resources.