Implementing End-to-End Redshift Security | AWS Certified Big Data - Specialty

Achieving Redshift Security | Options for End-to-End Protection

Question

Allianz Financial Services (AFS) is a banking group offering end-to-end banking and financial solutions in South East Asia through its consumer banking, business banking, Islamic banking, investment finance and stock broking businesses as well as unit trust and asset administration, having served the financial community over the past five decades. AFS uses Redshift on AWS to fulfill the data warehousing needs and uses S3 as the staging area to host files.

AFS uses other services like DynamoDB, Aurora, and Amazon RDS on remote hosts to fulfill other needs.

AFS want to implement Redshift security end to end.

How can this be achieved? select 2 options.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

Answer : A,B.

Amazon Redshift database security is distinct from other types of Amazon Redshift security.

In addition to database security, which is described in this section, Amazon Redshift provides these features to manage security:

Sign-in credentials - Access to your Amazon Redshift Management Console is controlled by your AWS account privileges.

For more information, see Sign-In Credentials.

Access management - To control access to specific Amazon Redshift resources, you define AWS Identity and Access Management (IAM) accounts.

For more information, see Controlling Access to Amazon Redshift Resources.

Cluster security groups - To grant other users inbound access to an Amazon Redshift cluster, you define a cluster security group and associate it with a cluster.

For more information, see Amazon Redshift Cluster Security Groups.

VPC - To protect access to your cluster by using a virtual networking environment, you can launch your cluster in an Amazon Virtual Private Cloud (VPC)

For more information, see Managing Clusters in Virtual Private Cloud(VPC).

Cluster encryption - To encrypt the data in all your user-created tables, you can enable cluster encryption when you launch the cluster.

For more information, see Amazon Redshift Clusters.

SSL connections - To encrypt the connection between your SQL client and your cluster, you can use secure sockets layer (SSL) encryption.

For more information, see Connect to Your Cluster Using SSL.

Load data encryption - To encrypt your table load data files when you upload them to Amazon S3, you can use either server-side encryption or client-sideencryption.

When you load from server-side encrypted data, Amazon S3 handles decryption transparently.

When you load from client-side encrypted data, the Amazon Redshift COPY command decrypts the data as it loads the table.

For more information, see Uploading Encrypted Data to Amazon S3.

Data in transit - To protect your data in transit within the AWS cloud, Amazon Redshift uses hardware accelerated SSL to communicate with Amazon S3 or Amazon DynamoDB for COPY, UNLOAD, backup, and restore operations.

https://docs.aws.amazon.com/redshift/latest/dg/c_security-overview.html

To implement end-to-end security in Redshift, AFS can take the following two steps:

  1. Define a cluster security group and associate it with a cluster to control access to specific Amazon Redshift resources:

This option involves creating a cluster security group that acts as a virtual firewall, controlling access to the cluster. It allows AFS to specify inbound access rules that control the IP addresses or security groups that are allowed to access the cluster. A cluster security group can also specify outbound access rules that control the destination IP addresses and ports that are allowed for outbound traffic from the cluster.

By creating a cluster security group, AFS can control access to specific Redshift resources, such as clusters, snapshots, and parameter groups. They can also use VPC security groups in conjunction with cluster security groups to provide additional security.

  1. To encrypt the connection between your SQL client and your cluster, enable cluster encryption when you launch the cluster:

This option involves encrypting data in transit between the SQL client and the Redshift cluster. AFS can enable cluster encryption when they launch the cluster, which encrypts data in transit using SSL/TLS protocols. Cluster encryption provides end-to-end encryption between the SQL client and the cluster, protecting data in transit from unauthorized access.

To summarize, to implement Redshift security end to end, AFS can define a cluster security group and associate it with the cluster to control access to specific resources, and enable cluster encryption when they launch the cluster to encrypt data in transit between the SQL client and the cluster.