Amazon Elastic Block Store uses a two-fold approach to protect data. Amazon EBS encryption and AWS Identity and...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Access Management protect data as it moves between EC2 instances and volumes.
Administrators use AWS Identity and Access Management (IAM) to control which users or groups can -- and can't -- access services such as Elastic Block Store (EBS) volumes. IAM can also set access conditions, such as SSL links, originating IP addresses, times of day and the use of multifactor authentication devices to allow access to EBS resources.
Administrators can create encrypted EBS volumes that encrypt data at rest within the volume, data moving between the volume and an Elastic Compute Cloud (EC2) instance and all EBS snapshots -- usually replicated to Amazon Simple Storage Service -- created from the encrypted EBS volume. All four types of volumes support Amazon EBS encryption. The actual encryption and decryption is performed transparently on EC2 servers to secure in-flight data; this doesn't significantly affect latency. AWS Key Management Service can create the 256-bit customer master key, or the admin can opt to use her own custom key for an added measure of protection.
Many -- but not all -- EC2 instance types support Amazon EBS encryption, and an admin cannot change encryption after creating a volume. That is, an unencrypted volume cannot later be encrypted, and an encrypted volume cannot later be unencrypted. If an admin does need to change Amazon EBS encryption status, she can migrate one volume to another with the desired encryption set for the destination volume.
Boost application, EBS performance
Back up cloud workloads with EBS snapshots
Save an EBS snapshot to Amazon S3
Dig Deeper on AWS security
Related Q&A from Stephen J. Bigelow
RAID 5 and RAID 6 erasure coding, deduplication and compression are similar but distinct concepts that reduce data and maintain storage capacity in ...continue reading
To configure RAID 1, RAID 5 or RAID 6 erasure coding in VMware vSAN 6.2, an administrator must first choose the proper RAID protection settings.continue reading
RAID provides workload resilience and protects against data loss, but not all levels of RAID are made alike. What are the storage tradeoffs for RAID ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.