Your company has lot of Patient data stored on S3 and has finally decided to use Spark for performing various kind of data analysis on S3
The security team in the company has asked the project teams to follow data encryption best practices on EMR.
Which of the following data encryption mechanisms are supported by EMR?
Click on the arrows to vote for the correct answer
A. B. C. D.Option B is incorrect: SSE with customer-provided keys (SSE-C) is not available for use with Amazon EMR.
Option D is incorrect: Transparent Data Encryption is supported by RDS.
SSE-KMS and LUKS encryption is supported on EMR clusters.
https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-data-encryption-options.htmlAmazon Elastic MapReduce (EMR) provides a managed Hadoop framework that enables processing of big data across a cluster of Amazon EC2 instances. EMR allows you to run big data processing frameworks like Apache Spark, Hadoop, and Hive on AWS. It provides a secure, scalable, and reliable environment for big data analytics.
EMR supports several data encryption mechanisms that enable you to secure data stored on the Amazon S3 service. Let's look at the options provided in the question:
A. LUKS encryption: LUKS (Linux Unified Key Setup) is a disk encryption standard that is commonly used in Linux-based systems. However, EMR does not support LUKS encryption for data stored on S3.
B. SSE-C: Server-Side Encryption with Customer-Provided Keys (SSE-C) is a method of encrypting data stored on S3 by providing your own encryption key. EMR supports SSE-C encryption for data stored on S3.
C. SSE-KMS: Server-Side Encryption with AWS Key Management Service (SSE-KMS) is a method of encrypting data stored on S3 that uses AWS KMS to manage the encryption keys. EMR supports SSE-KMS encryption for data stored on S3.
D. Transparent Data Encryption (TDE): TDE is a feature provided by Oracle database that enables data at rest encryption. EMR does not support TDE for data stored on S3.
In summary, EMR supports SSE-C and SSE-KMS encryption mechanisms for securing data stored on S3.