Understanding data protection in EMR
As you have learned in relation to the shared responsibility model in the Understanding the basics of security section of this chapter, you are responsible for maintaining the security of your applications and data by integrating security configurations and controls provided by AWS. As part of the security implementation, you can make your data secure, both in transit and at rest.
The following are some of the high-level security guidelines that you can follow to make your data secure:
- Follow data governance practices to define your user personas and the access privileges they will have.
- Define IAM users, groups, and roles as per the user personas and application requirements and observe the guidelines regarding least privilege.
- Use MFA for additional security on sensitive accounts or data access.
- Leverage the TLS protocol to communicate with AWS services or resources.
- Leverage AWS CloudTrail logs for auditing user...