How you can prove it to cybersecurity and what it means to your infrastructure lifecycle. — Imagine someone from InfoSec asks you, “how do we control access to the keys that encrypt the logs?” You can tell them, “control access to the logs themselves, and nobody needs access to the keys.” They may object, “But to launch an encrypted EBS volume, you, or the AutoScaling group…