S3 Encryption Flashcards

1
Q

What is Client-Side Encryption in the context of Amazon S3?

A

Client-Side Encryption is the process of encrypting data before it is transmitted to Amazon S3. The encryption and decryption are performed on the client’s side, and the client manages the encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Server-Side Encryption with Customer-Provided Keys (SSE-C)?

A

SSE-C is a method where Amazon S3 performs the encryption and decryption of objects while the customer provides and manages the encryption keys. The key must be provided in each request to access the encrypted object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3)?

A

SSE-S3 is an encryption method where Amazon S3 automatically handles the encryption, decryption, and security of the encryption keys. It uses AES-256 encryption algorithm and manages the keys internally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Server-Side Encryption with AWS Key Management Service (SSE-KMS)?

A

SSE-KMS includes the benefits of SSE-S3 but with additional security controls and audit trail features provided by AWS KMS. It enables customers to use AWS-managed keys or customer-managed keys in KMS for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the default bucket encryption setting improve S3 security?

A

Default bucket encryption automatically encrypts all new objects stored in the bucket without requiring any explicit action from the user. It ensures that all data is encrypted at rest, enhancing the security posture of the bucket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does SSE-KMS enhance security compared to SSE-S3?

A

SSE-KMS enhances security by providing an audit trail that shows when and by whom each key was used. It also offers additional controls, such as the ability to create, rotate, disable, and define permissions on encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can Client-Side Encryption be combined with Server-Side Encryption?

A

Yes, Client-Side Encryption can be combined with Server-Side Encryption for double layer security. The data is encrypted on the client’s side and then encrypted again when stored in S3. However, this is only typically necessary for highly sensitive data as it adds complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does SSE-KMS achieve role separation?

A

SSE-KMS achieves role separation by leveraging AWS KMS, which allows for creating and controlling access to encryption keys. Different IAM policies can be attached to different roles, limiting who can manage keys and who can access the encrypted data, effectively separating data management and security roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the implications of using SSE-C for object access?

A

Using SSE-C requires that the encryption key be provided for each HTTP request to access the encrypted objects. This method provides strong security but increases operational complexity since the customer must securely manage and use the encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why might an organization prefer using SSE-KMS over SSE-S3 for encryption?

A

An organization might prefer SSE-KMS over SSE-S3 for its additional key management features, audit capabilities, and the ability to control and rotate encryption keys. It offers a balance of automation and control, making it suitable for compliance-driven environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly