Certified Security - Specialty

Sign Up Free or Log In to participate!

How many keys there actually are?

First of all, great visual representation of how the KMS works on high level! Very helpful! I have a question. On the diagram, an admin puts CMK into KMS. Is CMK a generally known name or is it pretty generic? How many of these CMK can be put into KMS? If more than one, how it is decided, which CMK is used by an app to do the encryption/decryption? 

And also, even if there is only one CMK in KMS, does it mean that for each encryption request, there is new data-key created for the data encryption itself? 

And thanks a lot, this is very helpful course, very understandable!

0 Answers

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?