blog/source/_posts/2019-11-14-AWS-KMS.md
Ching 9690121403 feat(init project): add all existing files
add all existing files

Signed-off-by: Ching <loooching@gmail.com>
2022-02-02 19:04:18 +08:00

14 lines
467 B
Markdown

---
title: AWS KMS
date: 2019-11-14 15:19:05
tags:
---
We used to keep private credentials on production servers without any protection or encryption. Well, luckily we don't have any leak but this practice is not recommended for both security and easy of use reasons.
Since AWS finally provides [KMS(Key Management Service)][1] in our local region, we try to encrypt every private credentials by KMS and store them on S3.
*TBD*
[1]: https://www.amazonaws.cn/kms/