Managing Data Breach Risks in AWS Redshift
With the accelerating adoption of AWS Redshift as the next generation cloud-based data warehouse, it is imperative that organizations deploy the appropriate level of security to manage external and internal threats without impacting user experiences. We recommend the following six best practices for managing external and internal threats.
External Threat Management
- Encrypt data files using server side or client side technology prior to uploading them to S3
- Encrypt Redshift database to protect data at rest
- Encrypt SSL Connection between SQL client and the database
Internal Threat Management
- Identify and encrypt PII and PHI data fields prior to uploading the data files to S3
- Preserve format and maintain referential integrity when encrypting data fields
- Enable on-the-fly decryption for the privileged Redshift users and applications
To learn more, please see the following video or contact us at info@fe5.2b8.myftpupload.com
References:
- http://breachlevelindex.com/
- http://www.esecurityplanet.com/network-security/63-percent-of-enteprises-use-advanced-tech-without-securing-sensitive-data.htm
Contact Us