

# Resources
<a name="resources"></a>

## AWS service documentation
<a name="resources-aws-service-documentation"></a>
+ [AWS KMS Cryptographic Details](https://docs.aws.amazon.com/kms/latest/cryptographic-details/intro.html)
+ [AWS KMS Developer Guide](https://docs.aws.amazon.com/kms/latest/developerguide/overview.html)
  + [AWS KMS concepts](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html)
  + [Special-purpose keys](https://docs.aws.amazon.com/kms/latest/developerguide/key-types.html)
  + [Authentication and access control for AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/control-access.html)
  + [Security of AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/kms-security.html)
  + [How AWS services use AWS KMS](https://docs.aws.amazon.com/kms/latest/developerguide/service-integration.html)
+ [AWS CloudHSM User Guide](https://docs.aws.amazon.com/cloudhsm/latest/userguide/introduction.html)

## AWS marketing
<a name="resources-aws-marketing"></a>
+ [AWS KMS pricing](https://aws.amazon.com/kms/pricing/)
+ [AWS KMS integration with other AWS services](https://aws.amazon.com/kms/features/#AWS_Service_Integration)

## AWS Well-Architected Framework
<a name="resources-well-architected"></a>
+ [Protecting data in transit](https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-data-in-transit.html)
+ [Protecting data at rest](https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-data-at-rest.html)

## Hashing and tokenization
<a name="resources-hashing-tokenization"></a>
+ [How to use tokenization to improve data security and reduce audit scope](https://aws.amazon.com/blogs/security/how-to-use-tokenization-to-improve-data-security-and-reduce-audit-scope/) (AWS blog post)
+ [Recommendation for applications using approved hash algorithms](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf) (NIST publication)

## Videos
<a name="resources-videos"></a>
+ [How encryption works in AWS](https://youtu.be/plv7PQZICCM)
+ [Securing your block storage on AWS](https://youtu.be/Y1hE1Nkcxs8)
+ [Achieving security goals with AWS CloudHSM](https://youtu.be/Vox-PDRHIUs)
+ [Best practices for implementing AWS Key Management Service](https://youtu.be/X1eZjXQ55ec)
+ [A deep dive into AWS encryption services](https://youtu.be/gTZgxsCTfbk)