Storage & Data Management Flashcards
It can be used to manage your objects so that they are stored using the most cost effective S3 option throughout their lifecycle.
S3 Lifecycle Policies
What should you use in order to protect against accidental or malicious deletions of your version-controlled S3 buckets?
MFA Delete.
Why do you need a valid code from your MFA device?
- to enable permanent deletion of an S3 object.
- to suspend or reactivate versioning on the S3 bucket.
What can be used to Encrypt data in transit to s3?
SSL/TLS
Encrypts data between your PC and S3. (https)
What are the two different types of Encryption At-Rest for S3?
Server Side Encryption
Client Side Encryption
Three ways of Server Side Encryption for S3:
SSE-S3
SSE-KMS
SSE-C
Can a client encrypt data before uploading it to s3?
Yes!
By using Client side encryption.
Characteristics of SSE-S3:
- AWS Takes care of everything, you don’t need to worry about it.
- S3 Managed Keys
- AES256
Characteristics of SSE-KMS:
- KMS managed Keys
- Envelope key → The key that encrypts your data’s encryption key.
- Audit trail → records the use of your encryption key.
Characteristics of SSE-C:
- AWS manages the encryption and decryption activities
- Client manages the keys used.
- Rotation and all.
- x-amz-server-side-encryption: AES256
- x-amz-server-side-encryption: ams:kms
What do these parameters do?
When these parameters are included in the header of the PUT request, it simply tells S3 to encrypt the objects at the time of upload and using the specified encryption method.
How can you enforce the use of SSE for S3?
By using a bucket policy which denies any S3 PUT request which doesn’t include the x-amz-server-side-encryption parameter in the request header.
S3
Durable, immediately available, frequently accessed
S3 Standard
S3
Durable, immediately available, infrequently accessed
S3 IA
S3
Durable, immediately available, infrequently accessed, data store in a single AZ
S3 One Zone IA