Book Image

AWS Certified Developer - Associate Guide - Second Edition

By : Vipul Tankariya, Bhavin Parmar
5 (2)
Book Image

AWS Certified Developer - Associate Guide - Second Edition

5 (2)
By: Vipul Tankariya, Bhavin Parmar

Overview of this book

This book will focus on the revised version of AWS Certified Developer Associate exam. The 2019 version of this exam guide includes all the recent services and offerings from Amazon that benefits developers. AWS Certified Developer - Associate Guide starts with a quick introduction to AWS and the prerequisites to get you started. Then, this book will describe about getting familiar with Identity and Access Management (IAM) along with Virtual private cloud (VPC). Next, this book will teach you about microservices, serverless architecture, security best practices, advanced deployment methods and more. Going ahead we will take you through AWS DynamoDB A NoSQL Database Service, Amazon Simple Queue Service (SQS) and CloudFormation Overview. Lastly, this book will help understand Elastic Beanstalk and will also walk you through AWS lambda. At the end of this book, we will cover enough topics, tips and tricks along with mock tests for you to be able to pass the AWS Certified Developer - Associate exam and develop as well as manage your applications on the AWS platform.
Table of Contents (30 chapters)
Free Chapter
1
Overview of AWS Certified Developer - Associate Certification

How does KMS work?

KMS centrally stores and manages the encryption keys. These encryption keys are called CMKs. KMS can generate CMKs for you. Alternatively, you can use your own key management infrastructure to generate an encryption key and import it into KMS. AWS uses Hardware Security Modules (HSMs) in order to secure and protect your keys behind the scenes. KMS can process your request to encrypt or decrypt your data using these master keys. You can set up access policies on these keys and these allow you to determine who can access these keys to encrypt and decrypt the data.

KMS can be easily used with a number of AWS services. It also provides integration with client-side toolkits to encrypt data. KMS uses a method called envelope encryption in order to encrypt data. Here, KMS generates a data key that is used to encrypt the data and this data key is also encrypted using...