PrepAway - Latest Free Exam Questions & Answers

How can you secure data at rest on an EBS volume?

How can you secure data at rest on an EBS volume?

PrepAway - Latest Free Exam Questions & Answers

A.
Encrypt the volume using the S3 server-side encryption service.

B.
Attach the volume to an instance using EC2’s SSL interface.

C.
Create an IAM policy that restricts read and write access to the volume.

D.
Write the data randomly instead of sequentially.

E.
Use an encrypted file system m top of the EBS volume.

Explanation:

http://docs.aws.amazon.com/IAM/latest/UserGuide/policies_examples.html

11 Comments on “How can you secure data at rest on an EBS volume?

  1. Leonardo Giallusi says:

    Amazon EBS
    Amazon Elastic Block Store (Amazon EBS) provides block-level storage volumes for use with Amazon EC2 instances. Amazon EBS volumes are network-attached, and persist independently from the life of an instance.
    Because Amazon EBS volumes are presented to an instance as a block device, you can leverage most standard encryption tools for file system-level or block-level encryption
    Block level encryption
    Block level encryption tools usually operate below the file system layer using kernel space device drivers to perform encryption and decryption of data.
    These tools are useful when you want all data written to a volume to be encrypted regardless of what directory the data is stored in
    File System level encryption
    File system level encryption usually works by stacking an encrypted file system on top of an existing file system.
    This method is typically used to encrypt a specific directory
    These solutions require you to provide keys, either manually or from your KMI.
    Both block-level and file system-level encryption tools can only be used to encrypt data volumes that are not Amazon EBS boot volumes, as they don’t allow you to automatically make a trusted key available to the boot volume at startup
    There are third party solutions available, which can help encrypt both the boot and data volumes as well as supplying and protecting keys




    0



    0

Leave a Reply

Your email address will not be published. Required fields are marked *