Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Encryption in S3 [Video]

DZone's Guide to

Encryption in S3 [Video]

Read on and watch the video at the end for a discussion of both data security and cloud security issues related to the encryption of S3 buckets.

· Security Zone ·
Free Resource

Discover how to provide active runtime protection for your web applications from known and unknown vulnerabilities including Remote Code Execution Attacks.

Some of 2017's largest data breaches involved unprotected Amazon Simple Storage (S3) buckets that left millions of customer data records exposed to the public. The problem wasn't the technology, but administrators who improperly configured the security settings.

For cloud teams in charge of security, understanding the configurations and options available for securing data in the cloud can help them make the right choices.

In this short video sketch, our AWS Security expert Stuart Scott will take a closer look at encryption in S3.

Amazon S3 provides a number of encryption mechanisms to secure and protect your data when at rest, giving you the flexibility to select the most appropriate way of managing your keys.

These include:

  1. Server-Side encryption with S3 managed keys (SSE-S3)
  2. Server-Side encryption with KMS Managed keys (SSE-KMS)
  3. Server-Side encryption with customer-managed keys (SSE-C)
  4. Client-Side encryption with customer-managed keys (CSE-C)
  5. Client-Side encryption with KMS Managed keys (CSE-KMS)

SSE-KMS uses the AWS Key Management Service (KMS), which gives users the ability to generate, control, and store encryption keys allowing you to encrypt your data.

Let's take a look at how S3 works with KMS to perform both the encryption and decryption of your objects when using SSE-KMS.


Find out how Waratek’s award-winning application security platform can improve the security of your new and legacy applications and platforms with no false positives, code changes or slowing your application.

Topics:
security ,cloud security ,encryption ,data security

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}