Introduction to Secure Key Management – c120013gspl
Course #: c120013gspl
Duration: 0.8 Hours
IBM Key Protect for Cloud is secure key management. It protects against unauthorized access by insiders and outsiders of the organization. Users generate encryption keys to ensure data security in the public cloud while Key Protect acts as a key vault, securely storing data for the right people to access. As you manage the lifecycle of your keys, you can benefit from knowing they are secured by cloud-based hardware security modules (HSMs) that protect against the theft of information. You’ll learn the concept of Bring your own Key (BYOK) and describe IBM Key and the steps to create keys. You will also learn about envelope encryption and rotating keys, and how to remove, create, or delete new Root and Standard keys. Finally, learn how IBM Hyper Protect Crypto Services serves as a key storage and cloud hardware security module.
Objectives
After completing, you will be able to:
- Use IBM Key Protect to guarantee data security
- Manage the lifecycle of keys
- Explain Bring your own Key (BYOK)
- Discuss envelope encryption and rotating keys
- Use IBM Hyper Protect Crypto Services for key storage
Audience
This course is intended for learners who are pursuing professional-level developer certification on IBM Cloud.
Prerequisites
• IBM Cloud Solution Advisor Associate Learning Path
• Recommended skills: Experience using the technologies such as Java, Python, Node, Maven, NPM, Git, Docker and Kubernetes
Topics
After completing, you will be able to:
- Use IBM Key Protect to guarantee data security
- Manage the lifecycle of keys
- Explain Bring your own Key (BYOK)
- Discuss envelope encryption and rotating keys
- Use IBM Hyper Protect Crypto Services for key storage