EMR File System Client-side Encryption Using AWS KMS-managed Keys Reviews

1597 reviews

Marvin C. · Reviewed almost 9 years ago

Simon Y. · Reviewed almost 9 years ago

Lord Wilfrando S. · Reviewed almost 9 years ago

Rayjan W. · Reviewed almost 9 years ago

Bradley W. · Reviewed almost 9 years ago

easy enough

Victor B. · Reviewed almost 9 years ago

5 starts

Susan J. · Reviewed almost 9 years ago

Kun-Ta T. · Reviewed almost 9 years ago

Victor W. · Reviewed almost 9 years ago

Not sure why emr was chosen for this lab. Seems like a more complex scenario than is needed. Something more general might have been better.

Jesse B. · Reviewed almost 9 years ago

I learned how to use EMR File System Client-side Encryption using AWS KMS Managed Keys

Mikhail H. · Reviewed almost 9 years ago

Sharad J. · Reviewed almost 9 years ago

Nicholas P. · Reviewed almost 9 years ago

Adam R. · Reviewed almost 9 years ago

4

Milay B. · Reviewed almost 9 years ago

Swapnil B. · Reviewed almost 9 years ago

Lou R. · Reviewed almost 9 years ago

Alan C. · Reviewed almost 9 years ago

IAM --> KMS --> Encryption Key: {id: created; alias: specified, I was wondering why don't specify a name but an alias; policy: administrator/users } Security Configuration: specify what to enable; at-rest or in-transit encryption, using what mode(CSE KMS provided by AWS KMS), using what key(predefined). Then hadoop fs can use them

Kang X. · Reviewed almost 9 years ago

Sameer G. · Reviewed almost 9 years ago

Sameer G. · Reviewed almost 9 years ago

i think the details in this lab need to be updated to the changes in the AWS console, hard to follow

Steve C. · Reviewed almost 9 years ago

Neil C L. · Reviewed almost 9 years ago

Jose N. · Reviewed almost 9 years ago

Martin T. · Reviewed almost 9 years ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.