Best PracticesVendor Services

Zero-privilege operations: Running services without access to data

AWS works with organizations and regulators to host some of the most sensitive workloads in industry and government. In this session, learn how AWS secures data, even from trusted AWS operators and services.

Explore the AWS Nitro System and how it provides confidential computing and a trusted runtime environment, and dive deep into the cryptographic chains of custody that are built into AWS Identity and Access Management (IAM).

Finally, hear how encryption is used to provide defense in depth and why we focus on verified isolation and customer transparency at AWS.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button