SlideShare a Scribd company logo
1 of 18
Download to read offline
Protect your
Data on AWS
using the
Encryption
method
About Speaker
Liudmyla Dziubynska
CTO at Zenbit Tech
Expert in full-stack development and AWS
Proficient in modern technologies including ReactJS, NodeJS, GraphQL,
TypeScript
In-depth knowledge of cloud cost optimization techniques and strategies
Proven experience in cloud migration and deployment
Skilled in cloud security and data management
Familiar with cloud monitoring and analytics tools, such as Amazon CloudWatch
Knowledge of cloud resource management tools, such as AWS Auto Scaling or
Kubernetes
Experienced with cloud-based storage solutions, such as Amazon S3 or Google
Cloud Storage
Encryption on flight protect
against MITM (man in the
middle atack)
Encryption types
Encryption on flight (ssl)
1.
Data encrypted before
sending to server and
decrypted on server side
Ssl certificates help with
encryptions
Encryption and decryption key
should be managed somewhere
It stored in encrypted format thanks
to the key
Decrypted before send back to client
Encryption types
2. Server-side encryption on rest
Data is encrypted by received by server
Could leverage Envelope
encryption
Encryption types
3. Client-side encryption
Decrypted on the client side,
never decrypted by server-side
AWS KMS
It fully integrated with IAM for authorisation
You can audit KMS API calls with Cloud Trail
KMS manage encryption key for us
01 Symetryc(AES-256)
02
Asymmetric(RSA&ECC
keypairs)
KMS key types:
AWS managed key (free to
use) - aws/serwise-name,
example aws/rds
Customer manage key
(CMK) - 1$/m
CMS imported(should be
256 symmetric key) - 1$/m
3 types of KMS keys:
Default - created if you dont provide custom
policy, default give access to everyone in your
account to access the key
KMS Policies
If you will not provide right policy KMS key will not be accesseble
Custom - define users, roles who can have
accessto key, define who can administer the
key
EBS
gp2/gp3 (SSD): General purpose SSD volume
that balances price and performance for a
widevarietyofworkloads
iol / io2 (SSD): Highest-performance SSD
volume for mission-critical low-latency or
high-throughputworkloads
stl (HDD): Low cost HDD volume designed for
frequently accessed, throughput-intensive
workloads
scl (HDD): Lowest cost HDD volume designed
forlessfrequentlyaccessedworkloads
EBS Volumes come in 6 types
Data at rest is encrypted inside the volume
All the data in flight moving between the
instance and the volume is encrypted
All snapshots are encrypted
All volumes created from the snapshot
Encryption and decryption are handled
transparently
WhenyoucreateanencryptedEBSvolume,you
getthefollowing:
Create an EBS snapshot of the volume
Encrypt the EBS snapshot ( using copy)
Create new ebs volume from the snapshot ( the
volume will also be encrypted)
Attach the encrypted volume to the original
instance
StepstoencryptanunencryptedEBSvolume:
EBS Encryption
01
Server-Side Encryption with Amazon S3-Managed
Keys (SSE-S3) - Encrypts S3 objects using keys
handled,managed,andownedbyAWS
03
02
04
S3 encryption
Client-SideEncryption
Server-Side Encryption with KMS Keys stored in AWS
KMS (SSE-KMS) - Leverage AWS Key Management
Service(AWSKMS)tomanageencryptionkeys
Server-Side Encryption with Customer-Provided
Keys (SSE-C) - When you want to manage your
ownencryptionkeys
Amazon S3 Encryption — SSE-S3
User
HTTP(S) + Header
*Encryptionusingkeyshandled,managed,andownedbyAWS
*Objectisencryptedserver-sidebyAWS
*EncryptiontypeisAES-256
*Mustsetheader"x-amz-server-side-encryption":"AES256"
Object
S3 Owner Key
Encryption
S3 Bucket
Amazon S3
Amazon S3 Encryption — SSE-KMS
HTTP(S) + Header
User
*EncryptionusingkeyshandledandmanagedbyAWSKMS(KeyManagementService)
*KMSadvantages:usercontrol+auditkeyusageusingCloudTrail
*Objectisencryptedserverside
*Mustsetheader"x-amz-server-side-encryption":"aws:kms"
Object
KMS Key
Encryption
S3 Bucket
AWS KMS
Amazon S3
If you use SSE-KMS, you may be impacted by the
KMS limits
When you download, it calls the Decrypt KMS API
Count towards the KMS quota per second (5500,
10000, 30000 req/s based on region)
SSE-KMS Limitation
When you upload, it calls the GenerateDataKey
KMS API
Amazon S3 Encryption — SSE-C
User
HTTPSONLY
*Server-SideEncryptionusingkeysfullymanagedbythecustomeroutsideofAWS
*AmazonS3doesNOTstoretheencryptionkeyyouprovide
*HTTPSmustbeused
*EncryptionkeymustprovidedinHTTPheaders,foreveryHTTPrequestmade
Object
Client-Provided Key
Encryption
S3 Bucket
Amazon S3
upload
+ Key in Header
Amazon S3 Encryption — Client-Side Encryption
*UseclientlibrariessuchasAmazonS3Client-SideEncryptionLibrary
*ClientsmustencryptdatathemselvesbeforesendingtoAmazonS3
*ClientsmustdecryptdatathemselveswhenretrievingfromAmazonS3
*Customerfullymanagesthekeysandencryptioncycle
Encryption
File
S3 Bucket
Amazon S3
Client Key
HTTP(S)
File
(Encrypted)
upload
When it comes to encryption in AWS, compliance
is a critical consideration.
The GDPR does not specify a particular type of
encryption that organizations must use. Instead,
the GDPR requires that organizations implement
appropriate technical and organizational
measures to ensure a level of security
appropriate to the risks presented by the
processing of personal data.
AWS offers a range of compliance certifications,
including SOC 2, SOC 3, ISO 27001, PCI DSS, HIPAA,
and many others.
Compliance considerations
Join our Cloud Solutions Hub LinkedIn Group!
Contact us
We will be glad to answer on any questions!
Liudmyla Dziubynska
CTO at Zenbit Tech
Scan the QR-Code to get Lyudmila's
contacts and link to our Cloud
Solutions Hub LinkedIn Group!

More Related Content

Similar to Protect your Data on AWS using the Encryption method.pdf

Similar to Protect your Data on AWS using the Encryption method.pdf (20)

Big data security in AWS.pptx
Big data security in AWS.pptxBig data security in AWS.pptx
Big data security in AWS.pptx
 
Crypto Options in AWS
Crypto Options in AWSCrypto Options in AWS
Crypto Options in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)
 
Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017
 
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
 
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
 
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
 
Presentation by R Behera on KMS aws
Presentation by R Behera on KMS  awsPresentation by R Behera on KMS  aws
Presentation by R Behera on KMS aws
 
Securing data in the cloud
Securing data in the cloudSecuring data in the cloud
Securing data in the cloud
 
Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017
 
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
 
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side EncryptionSID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
 
MySQL Security on AWS Rds
MySQL Security on AWS RdsMySQL Security on AWS Rds
MySQL Security on AWS Rds
 
Overview of secret management solutions and architecture
Overview of secret management solutions and architectureOverview of secret management solutions and architecture
Overview of secret management solutions and architecture
 
AWS re:Invent 2016: Deep Dive on Amazon Relational Database Service (DAT305)
AWS re:Invent 2016: Deep Dive on Amazon Relational Database Service (DAT305)AWS re:Invent 2016: Deep Dive on Amazon Relational Database Service (DAT305)
AWS re:Invent 2016: Deep Dive on Amazon Relational Database Service (DAT305)
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
AWS Well Architected-Info Session WeCloudData
AWS Well Architected-Info Session WeCloudDataAWS Well Architected-Info Session WeCloudData
AWS Well Architected-Info Session WeCloudData
 

More from Zen Bit Tech

More from Zen Bit Tech (6)

Disaster Recovery on AWS Cloud.pdf
Disaster Recovery on AWS Cloud.pdfDisaster Recovery on AWS Cloud.pdf
Disaster Recovery on AWS Cloud.pdf
 
Service for Storing Secrets on Microsoft Azure.pdf
Service for Storing Secrets on Microsoft Azure.pdfService for Storing Secrets on Microsoft Azure.pdf
Service for Storing Secrets on Microsoft Azure.pdf
 
Services for Storing Secrets on AWS.pdf
Services for Storing Secrets on AWS.pdfServices for Storing Secrets on AWS.pdf
Services for Storing Secrets on AWS.pdf
 
Cloud Migration.pdf
Cloud Migration.pdfCloud Migration.pdf
Cloud Migration.pdf
 
AWS Cost Optimization.pdf
AWS Cost Optimization.pdfAWS Cost Optimization.pdf
AWS Cost Optimization.pdf
 
Building a GDPR-compliant architecture on AWS.pdf
Building a GDPR-compliant architecture on AWS.pdfBuilding a GDPR-compliant architecture on AWS.pdf
Building a GDPR-compliant architecture on AWS.pdf
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

Protect your Data on AWS using the Encryption method.pdf

  • 1. Protect your Data on AWS using the Encryption method
  • 2. About Speaker Liudmyla Dziubynska CTO at Zenbit Tech Expert in full-stack development and AWS Proficient in modern technologies including ReactJS, NodeJS, GraphQL, TypeScript In-depth knowledge of cloud cost optimization techniques and strategies Proven experience in cloud migration and deployment Skilled in cloud security and data management Familiar with cloud monitoring and analytics tools, such as Amazon CloudWatch Knowledge of cloud resource management tools, such as AWS Auto Scaling or Kubernetes Experienced with cloud-based storage solutions, such as Amazon S3 or Google Cloud Storage
  • 3. Encryption on flight protect against MITM (man in the middle atack) Encryption types Encryption on flight (ssl) 1. Data encrypted before sending to server and decrypted on server side Ssl certificates help with encryptions
  • 4. Encryption and decryption key should be managed somewhere It stored in encrypted format thanks to the key Decrypted before send back to client Encryption types 2. Server-side encryption on rest Data is encrypted by received by server
  • 5. Could leverage Envelope encryption Encryption types 3. Client-side encryption Decrypted on the client side, never decrypted by server-side
  • 6. AWS KMS It fully integrated with IAM for authorisation You can audit KMS API calls with Cloud Trail KMS manage encryption key for us 01 Symetryc(AES-256) 02 Asymmetric(RSA&ECC keypairs) KMS key types:
  • 7. AWS managed key (free to use) - aws/serwise-name, example aws/rds Customer manage key (CMK) - 1$/m CMS imported(should be 256 symmetric key) - 1$/m 3 types of KMS keys:
  • 8. Default - created if you dont provide custom policy, default give access to everyone in your account to access the key KMS Policies If you will not provide right policy KMS key will not be accesseble Custom - define users, roles who can have accessto key, define who can administer the key
  • 9. EBS gp2/gp3 (SSD): General purpose SSD volume that balances price and performance for a widevarietyofworkloads iol / io2 (SSD): Highest-performance SSD volume for mission-critical low-latency or high-throughputworkloads stl (HDD): Low cost HDD volume designed for frequently accessed, throughput-intensive workloads scl (HDD): Lowest cost HDD volume designed forlessfrequentlyaccessedworkloads EBS Volumes come in 6 types
  • 10. Data at rest is encrypted inside the volume All the data in flight moving between the instance and the volume is encrypted All snapshots are encrypted All volumes created from the snapshot Encryption and decryption are handled transparently WhenyoucreateanencryptedEBSvolume,you getthefollowing: Create an EBS snapshot of the volume Encrypt the EBS snapshot ( using copy) Create new ebs volume from the snapshot ( the volume will also be encrypted) Attach the encrypted volume to the original instance StepstoencryptanunencryptedEBSvolume: EBS Encryption
  • 11. 01 Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3) - Encrypts S3 objects using keys handled,managed,andownedbyAWS 03 02 04 S3 encryption Client-SideEncryption Server-Side Encryption with KMS Keys stored in AWS KMS (SSE-KMS) - Leverage AWS Key Management Service(AWSKMS)tomanageencryptionkeys Server-Side Encryption with Customer-Provided Keys (SSE-C) - When you want to manage your ownencryptionkeys
  • 12. Amazon S3 Encryption — SSE-S3 User HTTP(S) + Header *Encryptionusingkeyshandled,managed,andownedbyAWS *Objectisencryptedserver-sidebyAWS *EncryptiontypeisAES-256 *Mustsetheader"x-amz-server-side-encryption":"AES256" Object S3 Owner Key Encryption S3 Bucket Amazon S3
  • 13. Amazon S3 Encryption — SSE-KMS HTTP(S) + Header User *EncryptionusingkeyshandledandmanagedbyAWSKMS(KeyManagementService) *KMSadvantages:usercontrol+auditkeyusageusingCloudTrail *Objectisencryptedserverside *Mustsetheader"x-amz-server-side-encryption":"aws:kms" Object KMS Key Encryption S3 Bucket AWS KMS Amazon S3
  • 14. If you use SSE-KMS, you may be impacted by the KMS limits When you download, it calls the Decrypt KMS API Count towards the KMS quota per second (5500, 10000, 30000 req/s based on region) SSE-KMS Limitation When you upload, it calls the GenerateDataKey KMS API
  • 15. Amazon S3 Encryption — SSE-C User HTTPSONLY *Server-SideEncryptionusingkeysfullymanagedbythecustomeroutsideofAWS *AmazonS3doesNOTstoretheencryptionkeyyouprovide *HTTPSmustbeused *EncryptionkeymustprovidedinHTTPheaders,foreveryHTTPrequestmade Object Client-Provided Key Encryption S3 Bucket Amazon S3 upload + Key in Header
  • 16. Amazon S3 Encryption — Client-Side Encryption *UseclientlibrariessuchasAmazonS3Client-SideEncryptionLibrary *ClientsmustencryptdatathemselvesbeforesendingtoAmazonS3 *ClientsmustdecryptdatathemselveswhenretrievingfromAmazonS3 *Customerfullymanagesthekeysandencryptioncycle Encryption File S3 Bucket Amazon S3 Client Key HTTP(S) File (Encrypted) upload
  • 17. When it comes to encryption in AWS, compliance is a critical consideration. The GDPR does not specify a particular type of encryption that organizations must use. Instead, the GDPR requires that organizations implement appropriate technical and organizational measures to ensure a level of security appropriate to the risks presented by the processing of personal data. AWS offers a range of compliance certifications, including SOC 2, SOC 3, ISO 27001, PCI DSS, HIPAA, and many others. Compliance considerations
  • 18. Join our Cloud Solutions Hub LinkedIn Group! Contact us We will be glad to answer on any questions! Liudmyla Dziubynska CTO at Zenbit Tech Scan the QR-Code to get Lyudmila's contacts and link to our Cloud Solutions Hub LinkedIn Group!