Open In App

Amazon DynamoDB – Ways of Protecting Data in DynamoDB

Improve
Improve
Like Article
Like
Save
Share
Report

Amazon DynamoDB is a totally managed (“serverless”) and NoSQL (nonrelational) database provider, available on Amazon Web Services. DynamoDB is surprisingly scalable, which means you can start actually small and grow very big while not having to re-installation or re-architect. It additionally offers a bendy model which uses computerized scaling of throughput potential, because of this it scales compute ability-based totally on call for, saving cash and reducing entry fees. This makes it an incredible fit for cell, gaming, IoT, and other excessive-boom and excessive-volume packages.

Cloud has been a warm topic for a while now, with discussions on the pliability of pc offerings, the race to unfastened cloud storage charges, and hosted applications so that you don’t need to purchase and control software. Businesses small and massive were operating closer to migrating to the cloud with the idea of value financial savings and easing their reliance on premature capital expenditures for hardware and software programs.

Cloud Platform as a Service (PaaS) has been gaining traction in those discussions. Cloud vendors like Amazon, Azure, and Google provide sizeable PaaS services that allow users to cognizance on developing and using the offerings in preference to tweaking and patching software programs. The capacity to scale as your software adjusts is one of the primary reasons to transport to a controlled solution. Although one vicinity that quite a few users to start with forget about is to determine fine practices for the protection of their records. Typically, this is treated internally through the utility developer or through a separate backup crew. However, due to the character of PaaS offerings, the underlying infrastructure is not handy within the same manner as an on-premises answer. What’s wanted in these conditions is a facts protection solution that makes use of the cloud local systems in a way that might be designed to guard the information.

Commvault has the broadest and most in-intensity information safety answer for Cloud PaaS databases in the enterprise. As of the latest eleven.19 Feature Release, Commvault is providing backup and recovery support for Amazon DynamoDB.  

First off, for folks who aren’t aware of DynamoDB and its miles are, we’ll run through some quick points. It’s a fully managed NoSQL database service presented by way of Amazon and, because it’s PaaS, it’s absolutely serverless from the angle of the database user. No software to install and no patches to timetable, which isn’t always just a massive time saver, however additionally significantly reduces the security and vulnerability dangers related to unpatched software. We are seeing clients the usage of Cassandra and MongoDB, migrating to DynamoDB for those reasons.

One of the maximum not unusual questions we are requesting is, “Why do we need  third party  data protection solution?” Amazon offers local safety of DynamoDB for a period between zero to 35 days thru the usage of snapshots. Most organizations have information compliance guidelines they need to uphold, that are normally a good deal longer than 35 days. Numerous organizations are required to save statistics for so long as seven years, or even for all time! The challenge with the photo answer is the automation of retention, deletion, and replication. This all desires to be controlled via the user via a manual manner, a limited local answer, or complicated scripting.

The Commvault answer gives customers the capacity to carry out a streaming granular backup of tables, a complete location, or more than one region. In other words, the choice is yours to define your backups primarily based on your necessities. For example, assign a competitive backup coverage to your production data with multiple backups accordingly today and a greater at ease as soon as an afternoon backup coverage to Dev/Test facts.  Backups can be prepared based on Tags and Rules if that’s your choice.

Typically, we suggest primary backups are saved inside the same cloud place the source databases are strolling in. The secondary and tertiary copies can be stored in a different cloud vicinity, another cloud, or maybe lower back to an on-premises records center. Which approach backups are saved wherein you want and for so long as you want. Most agencies have compliance guidelines that require backup copies are saved in at least two physically extraordinary locations. However, due to the character of cloud outages, a duplicate of statistics typically needs to be saved in an opportunity cloud vendor. Native cloud backup solutions handiest provide the ability to store information inside the identical cloud.

What right are backups without restores? From a restore angle, you have the option to restore character tables, more than one table, or all tables in a location. Out-of-area restores are even feasible for those who want to restore to some other cloud account or a one-of-a-kind place.

As we noted, the native Amazon backup solution is through using snapshots, which means that a snapshot of the database is taken and saved. The primary difficulty with snapshots is that they’re only useful for restoring back to the identical database and cloud – not anything else. In this manner, you’re buying the storage of those snapshots if you might want them.

Encryption Of Data At REST:

Encrypting information at rest is crucial for regulatory compliance to ensure that touchy facts saved on disks aren’t always readable by any user or software without a valid key. Some compliance rules consisting of PCI DSS and HIPAA require that data at relaxation be encrypted at some point of the records lifecycle. To this end, AWS gives records-at-relaxation options and key control to guide the encryption manner. For instance, you could encrypt Amazon EBS volumes and configure Amazon S3 buckets for server-side encryption (SSE) with the use of AES-256 encryption.

As with unencrypted file systems, you can create encrypted file systems through the use of the AWS Management Console, the AWS CLI, or programmatically thru the Amazon EFS API or one of the AWS SDKs. Your corporation may require the encryption of all information that meets a specific classification or is associated with selected utility, workload, or surroundings.

How does encryption at rest works?

In an encrypted record gadget, facts and metadata are routinely encrypted earlier than being written to the document machine. Similarly, as records and metadata are read, they’re mechanically decrypted earlier than being provided to the utility. These methods are handled transparently via Amazon EFS so that you don’t should alter your packages.

Amazon EFS makes use of an enterprise-standard AES-256 encryption algorithm to encrypt EFS facts and metadata at rest. For more statistics, see Cryptography Basics within the AWS Key Management Service Developer Guide.

Steps to encrypt a file system at rest using EFS console:

  • Open Amazon Elastic File System Console.
  • Choose Create File System.
  • Choose your VPC(Virtual Private Cloud) or set it to your default VPC.
  • Choose to Create to create a file system that uses the following settings:
  1. Located in every Availability Zone in the Region in which the document device is created.
  2. Located within the default subnets of the VPC which you selected.
  3. Use the VPC’s default protection institution. You can control security groups after the record system is created.

  • The File system web page seems with a banner throughout the top showing the popularity of the file system you created. A hyperlink to get entry to the document gadget information web page appears inside the banner when the file system turns available.  

Data Protection in DAX (DynamoDB Accelerator):

Amazon DynamoDB Accelerator (DAX) encryption at relaxation offers an extra layer of facts protection by using supporting at ease your facts from unauthorized get entry to the underlying garage. Organizational policies, industry or government rules, and compliance requirements might require the use of encryption at relaxation to shield your information. You can use encryption to grow the security of the records of your packages that are deployed in the cloud

With encryption at rest, the information persevered by way of DAX on disk has encrypted the usage of 256-bit Advanced Encryption Standard, also referred to as AES-256 encryption. DAX writes statistics to disk as part of propagating changes from the number one node to examine replicas.

DAX encryption at relaxation mechanically integrates with AWS Key Management Service (AWS KMS) for handling the unmarried carrier default key this is used to encrypt your clusters. If a carrier default key does not exist whilst you create your encrypted DAX cluster, AWS KMS automatically creates a brand new AWS-controlled key for you. This key is used with encrypted clusters which are created inside the future. AWS KMS combines comfortable, incredibly to be had hardware and software to offer a key control machine scaled for the cloud.

After your facts are encrypted, DAX handles the decryption of your information transparently with minimal impact on performance. You don’t need to adjust your applications to use encryption.

Steps to enable DAX encryption at rest:

  • Give the desired name to your cluster.
  • Select a node type for all clusters.

  • Use 3 nodes for cluster size.  
  • In Encryption, click on Enable encryption.  
  • Choose IAM role, subnet group, security groups, and cluster settings.

  • Click on launch cluster.

Internetwork traffic privacy in Amazon VPC:

Amazon Virtual Private Cloud gives functions that you may use to grow and display the security on your virtual non-public cloud (VPC):

Security organizations: Security companies act as a firewall for related Amazon EC2 times, controlling each inbound and outbound site visitor at the example stage. When you launch an example, you may associate it with one or greater security agencies that you’ve created. Each example on your VPC may want to belong to a different set of protection corporations. If you do not specify a protection organization whilst you launch an instance, the example is mechanically associated with the default safety organization for the VPC. For extra facts, see Security companies on your VPC.

Network get entry to control lists (ACLs): Network ACLs act as a firewall for related subnets, controlling each inbound and outbound visitor at the subnet degree. For greater information, see Network ACLs.

Flow logs: Flow logs capture records approximately the IP traffic going to and from network interfaces in your VPC. You can create a waft log for a VPC, subnet, or character community interface. Flow log facts is posted to CloudWatch Logs or Amazon S3, and it let you diagnose overly restrictive or overly permissive protection group and network ACL guidelines. For greater facts, see VPC Flow Logs.

Traffic mirroring: You can copy network visitors from an elastic network interface of an Amazon EC2 instance. You can then send the site visitors to out-of-band safety and monitoring appliances. For more data, see the Traffic Mirroring Guide.

You can use AWS Identity and Access Management (IAM) to manipulate who in your organization has permission to create and manipulate security organizations, network ACLs, and float logs. For example, you could deliver your community administrators that permission, however no longer provide permission to employees who best want to release times. For extra records, see Identity and access management for Amazon VPC.

Amazon protection agencies and community ACLs do no longer filter out traffic destined to and from the following Amazon services:

  1. Amazon Dynamic Host Configuration Protocol (DHCP)
  2. Amazon EC2 instance metadata
  3. Amazon Domain Name Services (DNS)
  4. Amazon Time Sync Service
  5. Reserved IP address of the default VPC router.


Last Updated : 27 Mar, 2023
Like Article
Save Article
Previous
Next
Share your thoughts in the comments
Similar Reads