Data encryption is an essential tool
to use when your objective is to protect digital data. Data encryption takes
data that is legible and encodes it so that it is unreadable to anyone who does
not have access to the secret key that can be used to decode it. Thus, even if
an attacker gains access to your data, they cannot make sense of it.
Data at rest refers to data that is
physically stored on disk or on tape.
You can create encrypted file systems
on AWS so that all your data and metadata is encrypted at rest by using the
open standard Advanced Encryption Standard (AES)-256 encryption algorithm. When
you use AWS KMS, encryption and decryption are handled automatically and
transparently, so that you do not need to modify your applications. If your
organization is subject to corporate or regulatory policies that require
encryption of data and metadata at rest, AWS recommends enabling encryption on
all services that store your data. You can encrypt data stored in any service
that is supported by AWS KMS.
Data in transit refers to data that is
moving across the network. Encryption of data in transit is accomplished by
using Transport Layer Security (TLS) 1.2 with an open standard AES-256 cipher. TLS was formerly called Secure
Sockets Layer (SSL).
AWS Certificate Manager is a service
that enables you to provision, manage, and deploy SSL or TLS certificates for
use with AWS services and your internal connected resources. SSL or TLS certificates
are used to secure network communications and establish the identity of
websites over the internet, and also resources on private networks. With AWS
Certificate Manager, you can request a certificate and then deploy it on AWS
resources (such as load balancers or CloudFront distributions). AWS Certificate
Manager also handles certificate renewals.
Web traffic that runs over HTTP is not secure. However, traffic that runs over Secure HTTP (HTTPS) is encrypted by using TLS or SSL. HTTPS traffic is protected against eavesdropping and man-in-the-middle attacks because of the bidirectional encryption of the communication.
No comments:
Post a Comment