Data protection
We had a lot of fun putting AWS Outposts to work, checking configurations, creating a network design from scratch, and launching instances. While this is great, we must remember that security is said at AWS to be job zero, so important that we have dedicated an entire chapter to discussing Outposts’ capabilities and security features.
As you would have learned to expect by now, AWS uses the same services and principles used in the Region to secure data stored in Outposts. Data must be secured in transit and at rest and data deleted must be completely non-recoverable. AWS is designed to meet the most stringent data compliance requirements with comprehensive capabilities complemented by AWS services available in the Region.
When it comes to security, one thing that customers must always remember is that no mechanism or system in the world will be able to protect you from a poorly designed and maintained authentication, authorization, and accounting (AAA)...