Some of 2017’s largest data breaches involved unprotected Amazon Simple Storage (S3) buckets that left millions of customer data records exposed to the public. The problem wasn’t the technology, but administrators who improperly configured the security settings.
For cloud teams in charge of security, understanding the configurations and options available for securing data in the cloud can help them make them make the right choices.
Amazon S3 provides a number of encryption mechanisms to secure and protect your data when at rest, giving you the flexibility to select the most appropriate way of managing your keys.
- Server-Side encryption with S3 managed keys (SSE-S3)
- Server-Side encryption with KMS Managed keys (SSE-KMS)
- Server-Side encryption with customer-managed keys (SSE-C)
- Client-Side encryption with customer-managed keys (CSE-C)
- Client-Side encryption with KMS Managed keys (CSE-KMS)
SSE-KMS uses the AWS Key Management Service (KMS), which gives users the ability to generate, control, and store encryption keys allowing you to encrypt your data.
Let’s take a look at how S3 works with KMS to perform both the encryption and decryption of your objects when using SSE-KMS.