AWS Database Blog

Tag: security

Customizing security parameters on Amazon RDS for SQL Server

You can now use database (DB) parameters to configure security protocols and ciphers on Amazon RDS for SQL Server. You can configure various security protocols and ciphers available for your RDS SQL Server instance. You can also choose to enable or disable certain TLS versions or ciphers, such as RC4 stream cipher, based on your […]

Read More

Amazon RDS customers: Update your SSL/TLS certificates by March 5, 2020

This post was originally published on December 20, 2019 and has been updated as of March 4, 2020. Please see new dates and suggested timeline below. IMPORTANT UPDATE: If you are experiencing connectivity issues after the RDS Root CA expires, please skip down to the What do I have to do to maintain connectivity? section. […]

Read More

Securing Amazon RDS and Aurora PostgreSQL database access with IAM authentication

AWS provides two managed PostgreSQL options: Amazon RDS for PostgreSQL and Amazon Aurora PostgreSQL. Both support IAM authentication for managing access to your database. You can associate database users with IAM users and roles to manage user access to all databases from a single location, which avoids issues caused by permissions being out of sync […]

Read More

Bring your own encryption keys to Amazon DynamoDB

Today, Amazon DynamoDB introduced support for customer managed customer master keys (CMKs) to encrypt DynamoDB data. Often referred to as bring your own encryption (BYOE) or bring your own key (BYOK), this functionality lets you create, own, and manage encryption keys in DynamoDB, giving you full control over how you encrypt and manage the security […]

Read More

Applying best practices for securing sensitive data in Amazon DynamoDB

The first post of the series, Best practices for securing sensitive data in AWS data stores, described some generic security concepts and corresponding AWS security controls that you can apply to AWS data stores. Using these, you can create a stronger security posture around your data. The second post, Applying best practices for securing sensitive […]

Read More