Learn Domain 5: Data Protection (AWS SCS-C02) with Interactive Flashcards

Master key concepts in Domain 5: Data Protection through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

AWS KMS (Key Management Service)

AWS Key Management Service (KMS) is a fully managed service that enables you to create, manage, and control cryptographic keys used to protect your data across AWS services and applications. It is central to Domain 5: Data Protection in the SCS-C02 exam.

**Key Concepts:**

1. **Customer Master Keys (CMKs):** Now called KMS keys, these are the primary resources in AWS KMS. They can be symmetric (AES-256) or asymmetric (RSA or ECC). KMS keys never leave AWS KMS unencrypted.

2. **Key Types:**
- **AWS Managed Keys:** Created and managed by AWS on your behalf for integrated services.
- **Customer Managed Keys (CMKs):** Created and managed by you, offering full control over key policies, rotation, and lifecycle.
- **AWS Owned Keys:** Used internally by AWS services; not visible in your account.

3. **Envelope Encryption:** KMS uses envelope encryption where a data encryption key (DEK) encrypts your data, and the KMS key encrypts the DEK. This allows efficient encryption of large datasets.

4. **Key Policies and Grants:** Key policies are resource-based policies that control access to KMS keys. Grants provide temporary, granular permissions without modifying key policies.

5. **Key Rotation:** AWS supports automatic annual rotation for customer managed keys. The old key material is retained for decryption of previously encrypted data.

6. **Integration:** KMS integrates natively with services like S3, EBS, RDS, Lambda, Secrets Manager, and CloudTrail for seamless encryption.

7. **Auditing:** All KMS API calls are logged in AWS CloudTrail, providing a complete audit trail of key usage for compliance.

8. **Multi-Region Keys:** KMS supports multi-region keys that replicate across regions for disaster recovery and low-latency decryption.

9. **Custom Key Store:** You can use AWS CloudHSM-backed custom key stores for additional control over HSM hardware.

Understanding KMS is critical for the SCS-C02 exam, as it underpins encryption strategies, access control, and compliance across AWS environments.

AWS CloudHSM

AWS CloudHSM is a cloud-based Hardware Security Module (HSM) service that enables you to generate, store, and manage cryptographic keys within dedicated, tamper-resistant hardware devices hosted in AWS data centers. It plays a critical role in Domain 5: Data Protection of the AWS Certified Security – Specialty (SCS-C02) exam.

**Key Features:**

1. **Dedicated Hardware:** Unlike AWS KMS, which is a shared multi-tenant service, CloudHSM provides single-tenant, dedicated HSM instances that are fully under your control. The HSMs are FIPS 140-2 Level 3 validated, ensuring the highest standards of cryptographic security.

2. **Customer-Controlled Keys:** AWS has no access to your cryptographic keys. You maintain full and exclusive control over key management, meaning AWS cannot recover your keys if credentials are lost. This supports strict compliance requirements such as PCI DSS, HIPAA, and FedRAMP.

3. **Integration:** CloudHSM integrates with various AWS services and applications through industry-standard APIs such as PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG). It can also work with AWS KMS through Custom Key Stores, allowing KMS keys to be backed by CloudHSM.

4. **High Availability:** CloudHSM clusters can span multiple Availability Zones for redundancy and fault tolerance. AWS automatically manages backups, but key material remains encrypted and accessible only to you.

5. **Use Cases:** Common use cases include SSL/TLS offloading, database encryption (e.g., Oracle TDE), digital signing, certificate authority (CA) key protection, and meeting regulatory compliance that mandates hardware-based key storage.

6. **VPC Deployment:** CloudHSM instances are deployed within your VPC using Elastic Network Interfaces (ENIs), providing network-level isolation and security.

**Exam Relevance:** For SCS-C02, understand when to choose CloudHSM over KMS—typically when compliance mandates dedicated hardware, FIPS 140-2 Level 3 validation, or full customer control over key lifecycle management. Understanding the shared responsibility model distinction is essential.

S3 Data Protection

Amazon S3 Data Protection is a critical topic under Domain 5 of the AWS Certified Security – Specialty (SCS-C02) exam. It encompasses multiple layers of security mechanisms designed to protect data at rest and in transit within Amazon S3.

**Encryption at Rest:**
S3 offers several server-side encryption (SSE) options: SSE-S3 (Amazon-managed keys), SSE-KMS (AWS KMS-managed keys with audit trails via CloudTrail), and SSE-C (customer-provided keys). Client-side encryption is also supported, where data is encrypted before uploading. SSE-KMS provides granular control through key policies and supports automatic key rotation.

**Encryption in Transit:**
S3 supports TLS/SSL encryption for data in transit. You can enforce encryption in transit using bucket policies that deny requests not using `aws:SecureTransport` condition.

**Access Control:**
S3 provides multiple access control mechanisms including bucket policies, IAM policies, ACLs, and S3 Access Points. The principle of least privilege should always be applied. S3 Block Public Access settings provide account-level and bucket-level controls to prevent unintended public exposure.

**Versioning and Object Lock:**
Versioning protects against accidental deletion and overwrites by maintaining multiple object versions. S3 Object Lock enforces WORM (Write Once Read Many) policies using Governance or Compliance modes, preventing object deletion for a specified retention period. MFA Delete adds another layer of protection by requiring multi-factor authentication for version deletions.

**Monitoring and Auditing:**
S3 Server Access Logging and CloudTrail data events provide detailed audit trails of access patterns. Amazon Macie can automatically discover and protect sensitive data like PII stored in S3.

**Replication:**
Cross-Region Replication (CRR) and Same-Region Replication (SRR) provide data durability and disaster recovery capabilities. Replication can maintain encryption settings and object lock configurations.

**Bucket Policies Best Practices:**
Always enforce encryption using condition keys like `s3:x-amz-server-side-encryption`, restrict access by VPC endpoints, and use `aws:SourceVpce` or `aws:SourceIp` conditions to limit access to trusted networks.

EBS and RDS Encryption

**EBS Encryption:**

Amazon Elastic Block Store (EBS) encryption provides seamless encryption for EBS volumes and snapshots using AWS Key Management Service (KMS) keys. When you enable EBS encryption, the following are encrypted: data at rest inside the volume, data in transit between the volume and the instance, all snapshots created from the volume, and all volumes created from those snapshots.

Key points:
- EBS uses AES-256 encryption algorithm.
- Encryption is handled at the EC2 host level, meaning data is encrypted in transit between the EC2 instance and the EBS volume.
- You can use AWS-managed keys (aws/ebs) or Customer Managed Keys (CMKs) for granular access control.
- Encryption can be enabled by default for all new EBS volumes in a region through account-level settings.
- To encrypt an unencrypted volume, you must create a snapshot, copy it with encryption enabled, then create a new volume from the encrypted snapshot.
- There is minimal impact on latency, and encryption is transparent to applications.

**RDS Encryption:**

Amazon RDS encryption secures your database instances and automated backups using KMS keys. Once encryption is enabled at creation, it covers the underlying storage, automated backups, read replicas, and snapshots.

Key points:
- RDS encryption must be enabled at database creation time; you cannot encrypt an existing unencrypted RDS instance directly.
- To encrypt an unencrypted database, take a snapshot, copy the snapshot with encryption enabled, and restore from the encrypted snapshot.
- Read replicas must use the same encryption status as the primary instance.
- RDS supports Transparent Data Encryption (TDE) for SQL Server and Oracle as an additional layer.
- SSL/TLS can be enforced for encryption in transit.

**Shared Security Considerations:**
- Both services rely on KMS key policies and IAM policies for access control.
- Key rotation policies should be implemented.
- Cross-region snapshot copies require re-encryption with a key in the destination region.
- Understanding these encryption mechanisms is critical for the SCS-C02 exam's data protection domain.

Secrets Management

Secrets Management is a critical component of data protection in AWS, focusing on the secure storage, rotation, and access control of sensitive information such as API keys, database credentials, passwords, tokens, and encryption keys.

**AWS Secrets Manager** is the primary service for secrets management. It enables you to:

1. **Store Secrets Securely**: Secrets are encrypted at rest using AWS KMS (Key Management Service) encryption keys. You can use AWS-managed keys or customer-managed KMS keys for enhanced control.

2. **Automatic Rotation**: Secrets Manager supports automatic rotation of secrets using AWS Lambda functions. Built-in rotation templates exist for Amazon RDS, Amazon Redshift, and Amazon DocumentDB credentials. Custom Lambda functions can handle rotation for other secret types.

3. **Fine-Grained Access Control**: IAM policies and resource-based policies control who can access, modify, or rotate secrets. You can implement least-privilege access and use conditions like `aws:SourceVpc` to restrict access.

4. **Cross-Account Access**: Secrets can be shared across AWS accounts using resource-based policies, enabling centralized secrets management.

5. **Audit and Monitoring**: Integration with AWS CloudTrail logs all API calls to Secrets Manager. Amazon CloudWatch can monitor rotation failures, and AWS Config can track configuration changes.

**AWS Systems Manager Parameter Store** is an alternative for less complex scenarios, offering SecureString parameters encrypted with KMS. It is more cost-effective but lacks native automatic rotation.

**Best Practices include:**
- Never hardcode secrets in application code or configuration files
- Enable automatic rotation with the shortest acceptable rotation period
- Use VPC endpoints (PrivateLink) to access Secrets Manager without traversing the internet
- Implement monitoring and alerting for secret access patterns
- Apply resource-based policies to restrict secret access to specific VPCs or accounts
- Tag secrets for organizational and billing purposes

Secrets Management reduces the risk of credential exposure, ensures compliance with security standards, and simplifies credential lifecycle management across your AWS environment.

Data in Transit Encryption (TLS)

Data in Transit Encryption (TLS) is a critical component of AWS data protection strategy, ensuring that data remains confidential and tamper-proof as it moves between systems, services, and networks. Transport Layer Security (TLS) is the standard cryptographic protocol used to encrypt data during transmission, replacing the older SSL protocol.

In AWS, TLS is applied across multiple services and communication channels. When data travels between clients and AWS services, between AWS services themselves, or between on-premises infrastructure and AWS, TLS provides encryption to prevent eavesdropping, man-in-the-middle attacks, and data tampering.

Key AWS services leveraging TLS include:

1. **Elastic Load Balancer (ELB/ALB/NLB)**: Supports TLS termination and end-to-end encryption, allowing you to configure SSL/TLS certificates managed through AWS Certificate Manager (ACM).

2. **AWS Certificate Manager (ACM)**: Provides free public and private TLS certificates, automating certificate provisioning, renewal, and deployment across integrated AWS services.

3. **Amazon CloudFront**: Enforces HTTPS connections between viewers and distributions, supporting custom SSL certificates and TLS policies.

4. **API Gateway**: Enforces TLS for RESTful and WebSocket API communications.

5. **Amazon S3**: Supports HTTPS endpoints for encrypted data transfer and allows bucket policies to enforce encryption in transit using `aws:SecureTransport` condition.

6. **Amazon RDS/Aurora**: Supports TLS connections to encrypt database traffic using certificates provided by AWS.

Best practices for TLS in AWS include enforcing minimum TLS version 1.2, implementing security policies that reject unencrypted connections, using ACM for automated certificate management, enabling perfect forward secrecy (PFS), and applying resource policies that mandate secure transport.

For the SCS-C02 exam, understanding how to enforce TLS across services, configure security policies, manage certificates through ACM, and implement conditions like `aws:SecureTransport` in IAM and resource policies is essential. Additionally, knowing how to use VPN and AWS PrivateLink for encrypted private connectivity strengthens your data-in-transit protection posture.

More Domain 5: Data Protection questions
360 questions (total)