Reputation: 741
In AWS S3 encryption - which technique provides rotation policy for encryption keys?
I am reading recommended is SSE-KMS, but in some places questions where asked like "How does Amazon SSE-S3 key rotation work?"
So which one supports key rotation and if both are supporting key rotation which is recommended?
Upvotes: 1
Views: 2197
Reputation: 238687
There are several ways of encrypting S3 objects (or putting default encryption on a bucket). Below I only mention server-side encryption (i.e. that performed on the AWS side, not client side):
SSE-S3 - is free and uses AWS owned CMKs (CMK = Customer Master Key). The encryption key is owned and managed by AWS, and is shared among many accounts. Its rotation is automatic with time that varies as shown in the table here. The time is not explicitly defined.
SSE-KMS - has two flavors:
SSE-C - customer provided key. The encryption key is fully managed by you outside of AWS. AWS will not rotate it.
which is recommended?
It depends. I would say that generally SSE-S3
is sufficient and it simplifies a lot of operations, e.g. cross-account access to encrypted objects. But due to some external requirements (regulatory issues), other encryption options must be used.
For example, you may be required to rotate encryption key every 6 months. In this case, SSE-S3 nor SSE-KMS with AWS Managed CMK are applicable, and you have to use KMS with Customer Managed key and manually rotate it.
Upvotes: 2