Amazon Aurora Database Security & Data Security by DataSunrise
Security is a shared responsibility between the cloud provider and the customer in the cloud: AWS manages the security of the cloud, and customers are responsible for managing security in the cloud. DataSunrise Security helps organizations to keep their data and databases secure in the cloud.
On AWS Database Blog: Monitor Amazon Aurora database activities using DataSunrise Database Security.To protect Amazon Aurora database against internal and external threats, DataSunrise understands database’s behavior and is able to analyze database traffic. DataSunrise agent-less database protection and compliance for Amazon Aurora includes smart traffic analysis algorithms to ensure supporting the technologies used in Aurora:
Amazon Aurora Database Security Key Benefits:
- All authentication mechanisms
- Processing of SSL and TLS-encrypted traffic
- Processing of prepared statements and multi-statements
- Processing of Multiresultsets
- Processing of data import operations (LOAD XML and LOAD DATA)
- Converting binary data to text
- Tracking of system and user-defined variables
About Amazon Aurora
Amazon Aurora is RDBMS engine for Amazon RDS cloud storage service. Aurora is designed to be compatible with MySQL, thus MySQL applications, extensions and drivers can be used in Aurora with minimum or no modification.
Managing of Aurora is performed via AWS console. Aurora enables its user to create a data storage 10Gb-64Tb. Data storage size is increased automatically when required with 10 Gb increments. Aurora supports database replication as well (15 replicas max).
In order to increase database stability, Aurora is provided with self-recovery function and data backup mechanisms. Recovery system reboots database and its processes if a critical error occurs. If the primary database instance is disabled, client traffic is redirected to operational replica.
To keep valuable data intact, Aurora uses encryption for the database itself, backup copies, snapshots and replicas located in the same cluster. SSL encryption, in turn, is used to protect data being transferred.