

# Resources
<a name="resources"></a>
+ [Creating an enterprise encryption strategy for data at rest](https://docs.aws.amazon.com/prescriptive-guidance/latest/strategy-data-at-rest-encryption/welcome.html) (AWS Prescriptive Guidance)
+ [Security best practices for AWS Key Management Service](https://docs.aws.amazon.com/kms/latest/developerguide/best-practices.html) (AWS KMS documentation)
+ [How AWS services use AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/service-integration.html) (AWS KMS documentation)
+ [Security Pillar: Data protection](https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/data-protection.html) (AWS Well-Architected Framework)