7 Protecting data in the cloud

This chapter covers

  • Modelling applications with data flow diagrams
  • Using AWS Key Management Service for encryption at rest
  • Enabling backups or versioning to protect against and remediate attacks
  • Using and enforcing secure protocols when transferring data
  • Keeping detailed logs with built-in AWS services
  • Identifying and protecting potentially sensitive data with Amazon Macie

It seems that every week or so there’s another high-profile data breach in the news. Just in the last couple of weeks, I’ve seen announcements from a major hotel chain, a large video game company, and two cruise lines about leaks of customer data. The alarming rate at which these breaches occur is evidence of how common vulnerabilities in data ...

Get AWS Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.