We can protect the data in s3 in two ways.
1. Protecting Data Using Server-Side Encryption
In this case customer requests Amazon S3 to encrypt your object before saving it on disks in its data centers and decrypt it when you download the objects.
How?
Reference: https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html
2. Protecting Data Using Client-Side Encryption
In this case customer can encrypt data client-side and upload the encrypted data to Amazon S3. In this case, you manage the encryption process, the encryption keys, and related tools.
How?
Option 1: Using an AWS KMS–Managed Customer Master Key (CMK)
Option 2: Using a Client-Side Master Key
Reference: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingClientSideEncryption.html
1. Protecting Data Using Server-Side Encryption
In this case customer requests Amazon S3 to encrypt your object before saving it on disks in its data centers and decrypt it when you download the objects.
How?
Reference: https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html
- Use Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3)
– Each object is encrypted with a unique key
employing strong multi-factor encryption. As an additional
safeguard, it encrypts the key itself with a master key that it
regularly rotates.
Amazon S3 server-side encryption uses one of the strongest block
ciphers available, 256-bit Advanced Encryption Standard (AES-256), to
encrypt your data.
Reference: Protecting Data Using Server-Side Encryption with Amazon S3-Managed Encryption Keys (SSE-S3).
- Use Server-Side Encryption with AWS KMS-Managed Keys
(SSE-KMS) – Similar to SSE-S3, but with some additional
benefits along with some additional charges for using this service. There
are separate permissions for the use of an envelope key (that is, a key that
protects your data's encryption key) that provides added protection against
unauthorized access of your objects in S3. SSE-KMS also provides you with an
audit trail of when your key was used and by whom. Additionally, you have
the option to create and manage encryption keys yourself, or use a default
key that is unique to you, the service you're using, and the region you're
working in.
Reference: Protecting Data Using Server-Side Encryption with AWS KMS–Managed Keys (SSE-KMS).
- Use Server-Side Encryption with Customer-Provided Keys (SSE-C) – You manage encryption/decryption of your data, the
encryption keys, and related tools.
Reference: Protecting Data Using Server-Side Encryption with Customer-Provided Encryption Keys (SSE-C).
2. Protecting Data Using Client-Side Encryption
In this case customer can encrypt data client-side and upload the encrypted data to Amazon S3. In this case, you manage the encryption process, the encryption keys, and related tools.
How?
Option 1: Using an AWS KMS–Managed Customer Master Key (CMK)
Option 2: Using a Client-Side Master Key
Reference: https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingClientSideEncryption.html
Comments