TRANSCRIPTEnglish

AWS Certified Generative AI Developer - Professional: Security: KMS, data masking, PII protection

5m 19s771 words132 segmentsEnglish

FULL TRANSCRIPT

0:06

Security KMS data masking PII

0:08

protection. This is the day where AWS

0:10

checks something very simple and very

0:12

serious. Is your Genai system safe to

0:14

deploy in the real world? Not probably

0:17

secure, not we'll fix it later, but

0:19

secure enough to survive an audit.

0:22

Imagine this. A national healthare

0:24

agency builds an AI assistant. It

0:26

summarizes patient notes. It answers

0:28

internal questions. It helps staff find

0:30

procedures quickly. Then one mistake

0:32

happens. Raw patient data is logged. PII

0:35

appears in prompts. Encryption keys are

0:38

misused. The result isn't a warning.

0:40

It's legal penalties, system shutdowns,

0:42

and people losing their jobs. AWS wants

0:45

to know one thing. Would your design

0:47

survive that moment?

0:49

Let's start with the foundation. KMS.

0:52

AWS key management service exists to

0:54

control who can encrypt and decrypt

0:55

data. KMS does not store your data. It

0:58

enforces trust boundaries around it.

1:00

Anywhere your geni system stores data,

1:02

KMS should be involved. Documents in S3,

1:05

embeddings in open search, cache and

1:07

dynamob, secrets and secrets manager,

1:10

logs and cloudatch. If data is stored,

1:12

it should be encrypted with KMS. That's

1:14

not optional in regulated systems.

1:17

Here's the exam level truth about KMS.

1:20

Customer managed keys give you control.

1:22

Key policies and IM policies both

1:24

matter. Lease privilege applies to

1:26

encryption too and key rotation should

1:29

be enabled where possible. The common

1:31

trap is assuming encryption is

1:32

automatic. AWS expects you to explicitly

1:35

design for KMS, not assume it. Security

1:39

doesn't stop at storage. Data and

1:41

transit matters just as much. Client to

1:43

API gateway, application to bedrock,

1:46

application to open search, application

1:48

to Lambda tools. Every hop should be

1:51

encrypted with TLS. And if the exam says

1:53

no public internet, private

1:55

connectivity, compliance requirements,

1:57

the answer includes VPC endpoints,

2:00

notnet gateways, and hope. Now, let's

2:03

talk about the real danger. PII leaks

2:05

don't usually happen because of

2:06

attackers. They happen because of design

2:08

mistakes, logging raw prompts, passing

2:11

full identities into LLMs unnecessarily,

2:14

storing unmasked chat history, embedding

2:17

sensitive data permanently, returning

2:19

personal information and outputs. These

2:22

are the failures AWS loves to test. The

2:24

fix is data masking. Data masking means

2:27

removing or opuscating sensitive fields

2:29

before they reach unsafe places. Names

2:31

become placeholders. IDs are partially

2:33

hidden. Addresses are removed. The model

2:35

still works. The risk disappears. And

2:38

here's the critical part. Masking must

2:40

happen before. Prompting the model,

2:42

logging requests, and storing long-term

2:44

memory. You never rely on the model to

2:46

behave. Temperature is not a security

2:49

control. Prompts are not a security

2:51

control. Masking is. Consider this.

2:54

Instead of sending John Smith, born

2:56

1983, has condition X, you send patient

2:59

ded has condition X. The assistant still

3:03

summarizes correctly, but no personal

3:05

data is exposed. That's real security.

3:08

PII protection in Geni systems follows

3:10

four rules. First, minimize data. Only

3:13

send what the model actually needs. AWS

3:16

calls this data minimization. Second,

3:18

detect sensitive data. Use rules,

3:20

patterns, or classifiers before

3:21

prompting, logging, or storing. Third,

3:24

separate identity from content. Store

3:26

identifiers securely. Send content

3:28

without identity to the model. Fourth,

3:30

use guard rails to prevent unsafe

3:32

output. Guardrails stop bad responses.

3:35

They do not encrypt data. Different

3:37

tools, different jobs.

3:40

Memory deserves special attention.

3:42

Storing full conversations with PII and

3:44

embeddings is dangerous. Embeddings are

3:46

hard to delete and hard to audit. The

3:48

correct pattern is simple. Mask before

3:50

embedding. Store references separately.

3:53

Apply retention limits. AWS exams love

3:56

the phrase avoid storing sensitive data

3:58

in embeddings because it shows you

4:00

understand permanence. Now think about

4:03

audits. AWS expects you to mention

4:05

encrypted logs, restricted access, audit

4:08

trails, retention policies, cloudatch

4:11

logs, encrypted with KMS, cloud trail

4:13

tracking, key usage, IM access analyzer

4:16

to catch overreach. This is how systems

4:18

pass reviews. There are classic exam

4:20

traps here. Using prompts to ask the

4:23

model not to leak data, lowering

4:25

temperature for security, encrypting

4:26

only production data, storing everything

4:29

and cleaning later. All of these fail

4:30

audits. Security must be enforced before

4:33

the model sees the data. Here's the

4:35

mental map you should always carry. User

4:37

input enters. PII is detected and

4:40

masked. Prompts are constructed safely.

4:42

The model is invoked. Guard rails check

4:45

outputs. Logs are written without PII

4:47

and encrypted with KMS. That flow alone

4:50

answers most security questions. Lock

4:52

this sentence into memory. Mask before

4:54

prompting. Encrypt before storing. Log

4:57

without PII. If you remember that, day

4:59

26 is solved. Final self- test. A Genai

5:03

system logs full prompts including

5:04

customer names and IDs. What is the

5:07

correct fix? Apply data masking before

5:09

logging and encrypt logs using KMS.

5:12

That's not just an exam answer. That's

5:14

how you keep the system alive.

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.