EMR File System Client-side Encryption Using AWS KMS-managed Keys Reviews
1597 reviews
Marvin C. · Reviewed almost 9 years ago
Simon Y. · Reviewed almost 9 years ago
Lord Wilfrando S. · Reviewed almost 9 years ago
Rayjan W. · Reviewed almost 9 years ago
Bradley W. · Reviewed almost 9 years ago
easy enough
Victor B. · Reviewed almost 9 years ago
5 starts
Susan J. · Reviewed almost 9 years ago
Kun-Ta T. · Reviewed almost 9 years ago
Victor W. · Reviewed almost 9 years ago
Not sure why emr was chosen for this lab. Seems like a more complex scenario than is needed. Something more general might have been better.
Jesse B. · Reviewed almost 9 years ago
I learned how to use EMR File System Client-side Encryption using AWS KMS Managed Keys
Mikhail H. · Reviewed almost 9 years ago
Sharad J. · Reviewed almost 9 years ago
Nicholas P. · Reviewed almost 9 years ago
Adam R. · Reviewed almost 9 years ago
4
Milay B. · Reviewed almost 9 years ago
Swapnil B. · Reviewed almost 9 years ago
Lou R. · Reviewed almost 9 years ago
Alan C. · Reviewed almost 9 years ago
IAM --> KMS --> Encryption Key: {id: created; alias: specified, I was wondering why don't specify a name but an alias; policy: administrator/users } Security Configuration: specify what to enable; at-rest or in-transit encryption, using what mode(CSE KMS provided by AWS KMS), using what key(predefined). Then hadoop fs can use them
Kang X. · Reviewed almost 9 years ago
Sameer G. · Reviewed almost 9 years ago
Sameer G. · Reviewed almost 9 years ago
i think the details in this lab need to be updated to the changes in the AWS console, hard to follow
Steve C. · Reviewed almost 9 years ago
Neil C L. · Reviewed almost 9 years ago
Jose N. · Reviewed almost 9 years ago
Martin T. · Reviewed almost 9 years ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.