O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security in AWS Glacier

In AWS, Glacier stores data into a vault. It's only accessible to the users who created the vault. All the data stored Glaciers are encrypted, and they also support data in transit encryption using SSL.

Any data stored in the Glacier vault is immutable. This means that data stored in a Glacier cannot be updated. For access control and management you can use IAM policies. 

To add more security, you can use request signing, whereas to authenticate requests, you need to sign your request using hash keys. A cryptographic hash is a function that returns a unique hash value based on the input. In input, we pass secret access keys along with the request text. The hash function returns a hash value that you include in the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required