EMR File System Client-side Encryption Using AWS KMS-managed Keys

Go to Lab

267 Reviews

Victor Burzynski

easy enough

Victor B. · Reviewed about 15 hours ago

Susan Jin

5 starts

Susan J. · Reviewed 1 day ago

Isaac Tsai

Isaac T. · Reviewed 1 day ago

Victor Wu

Victor W. · Reviewed 3 days ago

Jesse Barry

Not sure why emr was chosen for this lab. Seems like a more complex scenario than is needed. Something more general might have been better.

Jesse B. · Reviewed 3 days ago

Mikhail Hathey

I learned how to use EMR File System Client-side Encryption using AWS KMS Managed Keys

Mikhail H. · Reviewed 3 days ago

Sharad Jain

Sharad J. · Reviewed 3 days ago

Nicholas Pitt

Nicholas P. · Reviewed 3 days ago

Adam Ranville

Adam R. · Reviewed 4 days ago

Milay Bhatt


Milay B. · Reviewed 5 days ago

Swapnil Bhootwala

Swapnil B. · Reviewed 5 days ago

Lou Rivas

Lou R. · Reviewed 5 days ago

Alan Cunnane

Alan C. · Reviewed 5 days ago

Kang Xie

IAM --> KMS --> Encryption Key: {id: created; alias: specified, I was wondering why don't specify a name but an alias; policy: administrator/users } Security Configuration: specify what to enable; at-rest or in-transit encryption, using what mode(CSE KMS provided by AWS KMS), using what key(predefined). Then hadoop fs can use them

Kang X. · Reviewed 6 days ago

Sameer Goel

Sameer G. · Reviewed 6 days ago

Sameer Goel

Sameer G. · Reviewed 8 days ago

Steve Cyphers

i think the details in this lab need to be updated to the changes in the AWS console, hard to follow

Steve C. · Reviewed 9 days ago

Neil C Lee IV

Neil C L. · Reviewed 10 days ago

Jose Nunes

Jose N. · Reviewed 10 days ago

Martin Tyrer

Martin T. · Reviewed 11 days ago

Cameron Smith

Cameron S. · Reviewed 12 days ago

Ashley Templet

Ashley T. · Reviewed 12 days ago

Yiyi Chen

Yiyi C. · Reviewed 12 days ago

Frank Waryan

Frank W. · Reviewed 13 days ago

Deniz Aybey

Deniz A. · Reviewed 13 days ago