docs.aws.amazon.com
Open in
urlscan Pro
13.35.58.2
Public Scan
Submitted URL: http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html
Effective URL: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html
Submission: On February 24 via api from IL — Scanned from IL
Effective URL: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html
Submission: On February 24 via api from IL — Scanned from IL
Form analysis
0 forms found in the DOMText Content
SELECT YOUR COOKIE PREFERENCES We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can click “Customize cookies” to decline performance cookies. If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To continue without accepting these cookies, click “Continue without accepting.” To make more detailed choices or learn more, click “Customize cookies.” Accept all cookiesContinue without acceptingCustomize cookies CUSTOMIZE COOKIE PREFERENCES We use cookies and similar tools (collectively, "cookies") for the following purposes. ESSENTIAL Essential cookies are necessary to provide our site and services and cannot be deactivated. They are usually set in response to your actions on the site, such as setting your privacy preferences, signing in, or filling in forms. PERFORMANCE Performance cookies provide anonymous statistics about how customers navigate our site so we can improve site experience and performance. Approved third parties may perform analytics on our behalf, but they cannot use the data for their own purposes. Allow performance category Allowed FUNCTIONAL Functional cookies help us provide useful site features, remember your preferences, and display relevant content. Approved third parties may set these cookies to provide certain site features. If you do not allow these cookies, then some or all of these services may not function properly. Allow functional category Allowed ADVERTISING Advertising cookies may be set through our site by us or our advertising partners and help us deliver relevant marketing content. If you do not allow these cookies, you will experience less relevant advertising. Allow advertising category Allowed Blocking some types of cookies may impact your experience of our sites. You may review and change your choices at any time by clicking Cookie preferences in the footer of this site. We and selected third-parties use cookies or similar technologies as specified in the AWS Cookie Notice. CancelSave preferences UNABLE TO SAVE COOKIE PREFERENCES We will only store essential cookies at this time, because we were unable to save your cookie preferences. If you want to change your cookie preferences, try again later using the link in the AWS console footer, or contact support if the problem persists. Dismiss Contact Us English Create an AWS Account 1. AWS 2. ... 3. Documentation 4. Amazon RDS 5. User Guide Feedback Preferences AMAZON RELATIONAL DATABASE SERVICE USER GUIDE * What is Amazon RDS? * DB instances * DB instance classes * DB instance storage * Regions, Availability Zones, and Local Zones * Supported Amazon RDS features by Region and engine * Blue/Green Deployments * Cross-Region automated backups * Cross-Region read replicas * Database activity streams * Dual-stack mode * Export snapshots to S3 * IAM database authentication * Kerberos authentication * Multi-AZ DB clusters * Performance Insights * RDS Custom * Amazon RDS Proxy * Secrets Manager integration * Zero-ETL integrations * Engine-native features * DB instance billing for Amazon RDS * On-Demand DB instances * Reserved DB instances * Setting up * Getting started * Creating and connecting to a MariaDB DB instance * Creating and connecting to a Microsoft SQL Server DB instance * Creating and connecting to a MySQL DB instance * Creating and connecting to an Oracle DB instance * Creating and connecting to a PostgreSQL DB instance * Tutorial: Create a web server and an Amazon RDS DB instance * Launch an EC2 instance * Create a DB instance * Install a web server * Tutorial: Create a Lambda function to access your Amazon RDS DB instance * Tutorials and sample code * Best practices for Amazon RDS * Configuring a DB instance * Creating a DB instance * Creating resources with AWS CloudFormation * Connecting to a DB instance * Working with option groups * Working with parameter groups * Overview of parameter groups * Working with DB parameter groups * Working with DB cluster parameter groups * Comparing DB parameter groups * Specifying DB parameters * Creating an ElastiCache cache from Amazon RDS * Managing a DB instance * Stopping a DB instance * Starting a DB instance * Connecting an AWS compute resource * Connecting an EC2 instance * Connecting a Lambda function * Modifying a DB instance * Maintaining a DB instance * Upgrading the engine version * Renaming a DB instance * Rebooting a DB instance * Working with DB instance read replicas * Tagging RDS resources * Working with ARNs * Working with storage * Deleting a DB instance * Configuring and managing a Multi-AZ deployment * Multi-AZ DB instance deployments * Multi-AZ DB cluster deployments * Creating a Multi-AZ DB cluster * Connecting to a Multi-AZ DB cluster * Connecting an AWS compute resource and a Multi-AZ DB cluster * Connecting an EC2 instance and a Multi-AZ DB cluster * Connecting a Lambda function and a Multi-AZ DB cluster * Modifying a Multi-AZ DB cluster * Renaming a Multi-AZ DB cluster * Rebooting a Multi-AZ DB cluster * Working with Multi-AZ DB cluster read replicas * Using PostgreSQL logical replication with Multi-AZ DB clusters * Deleting a Multi-AZ DB cluster * Using RDS Extended Support * Using Blue/Green Deployments for database updates * Overview of Amazon RDS Blue/Green Deployments * Creating a blue/green deployment * Viewing a blue/green deployment * Switching a blue/green deployment * Deleting a blue/green deployment * Backing up and restoring * Working with backups * Backing up and restoring a DB instance * Cross-Region automated backups * Creating a DB snapshot * Restoring from a DB snapshot * Copying a DB snapshot * Sharing a DB snapshot * Exporting DB snapshot data to Amazon S3 * Restoring a DB instance to a specified time * Deleting a DB snapshot * Tutorial: Restore a DB instance from a DB snapshot * Backing up and restoring a Multi-AZ DB cluster * Creating a Multi-AZ DB cluster snapshot * Restoring from a snapshot to a Multi-AZ DB cluster * Restoring from a Multi-AZ DB cluster snapshot to a DB instance * Restoring a Multi-AZ DB cluster to a specified time * Monitoring metrics in a DB instance * Overview of monitoring * Viewing instance status * Viewing and responding to Amazon RDS recommendations * Viewing Amazon RDS recommendations * Responding to Amazon RDS recommendations * Viewing metrics in the Amazon RDS console * Viewing combined metrics in the Amazon RDS console * Monitoring RDS with CloudWatch * Overview of Amazon RDS and Amazon CloudWatch * Viewing CloudWatch metrics * Exporting Performance Insights metrics to CloudWatch * Creating CloudWatch alarms * Tutorial: Creating a CloudWatch alarm for DB cluster replica lag * Monitoring DB load with Performance Insights * Overview of Performance Insights * Database load * Maximum CPU * Amazon RDS DB engine, Region, and instance class support for Performance Insights * Pricing and data retention for Performance Insights * Turning Performance Insights on and off * Turning on the Performance Schema for MariaDB or MySQL * Performance Insights policies * Analyzing metrics with the Performance Insights dashboard * Overview of the dashboard * Accessing the dashboard * Analyzing DB load * Analyzing database performance for a period of time * Analyzing queries * Overview of the Top SQL tab * Accessing more SQL text * Viewing SQL statistics * Analyzing Oracle execution plans * Viewing Performance Insights proactive recommendations * Retrieving metrics with the Performance Insights API * Logging Performance Insights calls using AWS CloudTrail * Analyzing performance with DevOps Guru for RDS * Monitoring the OS with Enhanced Monitoring * Overview of Enhanced Monitoring * Setting up and enabling Enhanced Monitoring * Viewing OS metrics in the RDS console * Viewing OS metrics using CloudWatch Logs * RDS metrics reference * CloudWatch metrics for RDS * CloudWatch dimensions for RDS * CloudWatch metrics for Performance Insights * Counter metrics for Performance Insights * SQL statistics for Performance Insights * SQL statistics for MariaDB and MySQL * SQL statistics for Oracle * SQL statistics for SQL Server * SQL statistics for RDS PostgreSQL * OS metrics in Enhanced Monitoring * Monitoring events, logs, and database activity streams * Viewing logs, events, and streams in the Amazon RDS console * Monitoring RDS events * Overview of events for Amazon RDS * Viewing Amazon RDS events * Working with Amazon RDS event notification * Overview of Amazon RDS event notification * Granting permissions * Subscribing to Amazon RDS event notification * Amazon RDS event notification tags and attributes * Listing Amazon RDS event notification subscriptions * Modifying an Amazon RDS event notification subscription * Adding a source identifier to an Amazon RDS event notification subscription * Removing a source identifier from an Amazon RDS event notification subscription * Listing the Amazon RDS event notification categories * Deleting an Amazon RDS event notification subscription * Creating a rule that triggers on an Amazon RDS event * Amazon RDS event categories and event messages * Monitoring RDS logs * Viewing and listing database log files * Downloading a database log file * Watching a database log file * Publishing to CloudWatch Logs * Reading log file contents using REST * MariaDB database log files * Microsoft SQL Server database log files * MySQL database log files * Overview of RDS for MySQL database logs * Publishing MySQL logs to Amazon CloudWatch Logs * Managing table-based MySQL logs * Configuring MySQL binary logging * Accessing MySQL binary logs * Oracle database log files * PostgreSQL database log files * Monitoring RDS API calls in CloudTrail * Monitoring RDS with Database Activity Streams * Overview * Configuring Oracle unified auditing * Configuring SQL Server auditing * Starting a database activity stream * Modifying a database activity stream * Getting the activity stream status * Stopping a database activity stream * Monitoring activity streams * Managing access to activity streams * Working with Amazon RDS Custom * RDS Custom architecture * RDS Custom security * Working with RDS Custom for Oracle * RDS Custom for Oracle workflow * Database architecture for Amazon RDS Custom for Oracle * Feature availability and support for RDS Custom for Oracle * RDS Custom for Oracle requirements and limitations * Setting up your RDS Custom for Oracle environment * Working with CEVs for RDS Custom for Oracle * Preparing to create a CEV * Creating a CEV * Modifying CEV status * Viewing CEV details * Deleting a CEV * Configuring an RDS Custom for Oracle DB instance * Managing an RDS Custom for Oracle DB instance * Working with RDS Custom for Oracle replicas * Backing up and restoring an RDS Custom for Oracle DB instance * Working with option groups in RDS Custom for Oracle * Migrating to RDS Custom for Oracle * Upgrading an RDS Custom for Oracle DB instance * Troubleshooting RDS Custom for Oracle * Working with RDS Custom for SQL Server * RDS Custom for SQL Server workflow * RDS Custom for SQL Server requirements and limitations * Setting up your RDS Custom for SQL Server environment * Bring Your Own Media with RDS Custom for SQL Server * Working with CEVs for RDS Custom for SQL Server * Preparing to create a CEV for RDS Custom for SQL Server * Creating a CEV for RDS Custom for SQL Server * Modifying a CEV for RDS Custom for SQL Server * Viewing CEV details for Amazon RDS Custom for SQL Server * Deleting a CEV for RDS Custom for SQL Server * Creating and connecting to an RDS Custom for SQL Server DB instance * Managing an RDS Custom for SQL Server DB instance * Managing a Multi-AZ deployment for RDS Custom for SQL Server * Backing up and restoring an RDS Custom for SQL Server DB instance * Migrating an on-premises database to RDS Custom for SQL Server * Upgrading a DB instance for RDS Custom for SQL Server * Troubleshooting Amazon RDS Custom for SQL Server * Working with RDS on AWS Outposts * Support for Amazon RDS features * Supported DB instance classes * Customer-owned IP addresses * Multi-AZ deployments * Creating DB instances for RDS on Outposts * Creating read replicas for RDS on Outposts * Considerations for restoring DB instances * Using RDS Proxy * Planning where to use RDS Proxy * RDS Proxy concepts and terminology * Getting started with RDS Proxy * Managing an RDS Proxy * Working with RDS Proxy endpoints * Monitoring RDS Proxy with CloudWatch * Working with RDS Proxy events * RDS Proxy examples * Troubleshooting RDS Proxy * Using RDS Proxy with AWS CloudFormation * Working with zero-ETL integrations (preview) * Getting started with zero-ETL integrations * Creating zero-ETL integrations * Adding and querying data * Viewing and monitoring zero-ETL integrations * Deleting zero-ETL integrations * Troubleshooting zero-ETL integrations * Db2 on Amazon RDS * Db2 overview * Db2 features * Db2 versions * Db2 licensing * Db2 instance classes * Db2 parameters * EBCDIC collation * DB instance prerequisites * Connecting to your Db2 DB instance * Finding the endpoint * IBM Db2 CLP * IBM CLPPlus * DBeaver * IBM Db2 Data Management Console * Security group considerations * Securing Db2 connections * Encrypting with SSL/TLS * Using Kerberos authentication * Administering your RDS for Db2 DB instance * System tasks * Database tasks * Amazon S3 integration * Create an IAM policy * Create an IAM role and attach your IAM policy * Add your IAM role to your DB instance * Migrating data to Db2 * Migration approaches that use AWS * One-time migration from Linux to Linux environments * Near-zero downtime migration for Linux-based Db2 databases * One-time migration from AIX or Windows to Linux environments * Synchronous migrations from Linux to Linux environments * Using AWS Database Migration Service (AWS DMS) * Native Db2 tools * Connecting a client machine to a DB instance * db2look tool * IMPORT command with a client machine * INGEST utility * INSERT command from a self-managed Db2 database * LOAD command with a client machine * Options for RDS for Db2 * Db2 audit logging * Known issues and limitations * RDS for Db2 stored procedures * Granting and revoking privileges * Managing buffer pools * Managing databases * Managing tablespaces * Managing audit policies * RDS for Db2 user-defined functions * Checking a task status * MariaDB on Amazon RDS * MariaDB feature support * MariaDB versions * Connecting to a DB instance running MariaDB * Securing MariaDB connections * MariaDB security * Encrypting with SSL/TLS * Using new SSL/TLS certificates * Improving query performance with RDS Optimized Reads * Improving write performance with RDS Optimized Writes for MariaDB * Upgrading the MariaDB DB engine * Importing data into a MariaDB DB instance * Importing data from an external database * Importing data to a DB instance with reduced downtime * Importing data from any source * Working with MariaDB replication * Working with MariaDB read replicas * Configuring GTID-based replication with an external source instance * Configuring binary log file position replication with an external source instance * Options for MariaDB * Parameters for MariaDB * Migrating data from a MySQL DB snapshot to a MariaDB DB instance * MariaDB on Amazon RDS SQL reference * mysql.rds_replica_status * mysql.rds_set_external_master_gtid * mysql.rds_kill_query_id * Local time zone * Known issues and limitations for MariaDB * Microsoft SQL Server on Amazon RDS * Licensing SQL Server on Amazon RDS * Connecting to a DB instance running SQL Server * Working with Active Directory with RDS for SQL Server * Working with Self Managed Active Directory with a SQL Server DB instance * Working with AWS Managed Active Directory with RDS for SQL Server * Updating applications for new SSL/TLS certificates * Upgrading the SQL Server DB engine * Importing and exporting SQL Server databases * Importing and exporting SQL Server data using other methods * Working with SQL Server read replicas * Multi-AZ for RDS for SQL Server * Additional features for SQL Server * Using SSL with a SQL Server DB instance * Configuring security protocols and ciphers * Amazon S3 integration * Using Database Mail * Instance store support for tempdb * Using extended events * Access to transaction log backups * Options for SQL Server * Linked Servers with Oracle OLEDB * Native backup and restore * Transparent Data Encryption * SQL Server Audit * SQL Server Analysis Services * SQL Server Integration Services * SQL Server Reporting Services * Microsoft Distributed Transaction Coordinator * Common DBA tasks for SQL Server * Accessing the tempdb database * Analyzing database workload with Database Engine Tuning Advisor * Changing the db_owner to the rdsa account for your database * Collations and character sets * Creating a database user * Determining a recovery model * Determining the last failover time * Disabling fast inserts * Dropping a SQL Server database * Renaming a Multi-AZ database * Resetting the db_owner role password * Restoring license-terminated DB instances * Transitioning a database from OFFLINE to ONLINE * Using CDC * Using SQL Server Agent * Working with SQL Server logs * Working with trace and dump files * MySQL on Amazon RDS * MySQL feature support * MySQL versions * Connecting to a DB instance running MySQL * Securing MySQL connections * MySQL security * Password Validation Plugin * Encrypting with SSL/TLS * Using new SSL/TLS certificates * Using Kerberos authentication for MySQL * Improving query performance with RDS Optimized Reads * Improving write performance with RDS Optimized Writes for MySQL * Upgrading the MySQL DB engine * Upgrading a MySQL DB snapshot engine version * Importing data into a MySQL DB instance * Restoring a backup into a MySQL DB instance * Importing data from an external database * Importing data with reduced downtime * Importing data from any source * Working with MySQL replication * Working with MySQL read replicas * Using GTID-based replication * Configuring binary log file position replication with an external source instance * Configuring multi-source replication * Configuring active-active clusters * Exporting data from a MySQL DB instance * Options for MySQL * MariaDB Audit Plugin * memcached * Parameters for MySQL * Common DBA tasks for MySQL * Local time zone * Known issues and limitations * RDS for MySQL stored procedures * Configuring * Ending a session or query * Logging * Managing active-active clusters * Managing multi-source replication * Managing the Global Status History * Replicating * Warming the InnoDB cache * Oracle on Amazon RDS * Oracle overview * Oracle features * Oracle versions * Oracle licensing * Oracle users and privileges * Oracle instance classes * Oracle database architecture * Oracle parameters * Oracle character sets * Oracle limitations * Connecting to your Oracle DB instance * Finding the endpoint * SQL developer * SQL*Plus * Security group considerations * Dedicated and shared server processes * Troubleshooting * Modifying Oracle sqlnet.ora parameters * Securing Oracle connections * Encrypting with SSL * Using new SSL/TLS certificates * Encrypting with NNE * Configuring Kerberos authentication * Region and version availability * Setting up * Managing a DB instance * Connecting with Kerberos authentication * Configuring UTL_HTTP access * Working with CDBs * Overview of CDBs * Configuring a CDB * Backing up and restoring a CDB * Converting a non-CDB to a CDB * Converting the single-tenant configuration to multi-tenant * Adding an RDS for Oracle tenant database to your CDB instance * Modifying an RDS for Oracle tenant database * Deleting an RDS for Oracle tenant database from your CDB * Viewing tenant database details * Upgrading your CDB * Administering your Oracle DB instance * System tasks * Database tasks * Log tasks * RMAN tasks * Oracle Scheduler tasks * Diagnostic tasks * Other tasks * Transporting tablespaces * Configuring advanced RDS for Oracle features * Configuring the instance store * Turning on HugePages * Turning on extended data types * Importing data into Oracle * Importing using Oracle SQL Developer * Migrating using Oracle transportable tablespaces * Importing using Oracle Data Pump * Importing using Oracle Export/Import * Importing using Oracle SQL*Loader * Migrating with Oracle materialized views * Working with Oracle replicas * Overview of Oracle replicas * Requirements and considerations for Oracle replicas * Preparing to create an Oracle replica * Creating a mounted Oracle replica * Modifying the replica mode * Working with Oracle replica backups * Performing an Oracle Data Guard switchover * Troubleshooting Oracle replicas * Options for Oracle * Overview of Oracle DB options * Amazon S3 integration * Application Express (APEX) * Amazon EFS integration * Java virtual machine (JVM) * Enterprise Manager * OEM Database Express * OEM Management Agent * Label security * Locator * Multimedia * Native network encryption (NNE) * OLAP * Secure Sockets Layer (SSL) * Spatial * SQLT * Statspack * Time zone * Time zone file autoupgrade * Transparent Data Encryption (TDE) * UTL_MAIL * XML DB * Upgrading the Oracle DB engine * Overview of Oracle upgrades * Major version upgrades * Minor version upgrades * Upgrade considerations * Testing an upgrade * Upgrading an Oracle DB instance * Upgrading an Oracle DB snapshot * Tools and third-party software for Oracle * Setting up * Using Oracle GoldenGate * Using the Oracle Repository Creation Utility * Configuring CMAN * Installing a Siebel database on Oracle on Amazon RDS * Oracle Database engine releases * PostgreSQL on Amazon RDS * PostgreSQL features * Connecting to a PostgreSQL instance * Securing connections with SSL/TLS * Using SSL with a PostgreSQL DB instance * Updating applications to use new SSL/TLS certificates * Using Kerberos authentication * Setting up * Managing a DB instance in a Domain * Connecting with Kerberos authentication * Using a custom DNS server for outbound network access * Upgrading the PostgreSQL DB engine * Upgrading a PostgreSQL DB snapshot engine version * Working with read replicas for RDS for PostgreSQL * Improving query performance with RDS Optimized Reads * Importing data into PostgreSQL * Importing a PostgreSQL database from an Amazon EC2 instance * Using the \copy command to import data to a table on a PostgreSQL DB instance * Importing data from Amazon S3 into RDS for PostgreSQL * Transporting PostgreSQL databases between DB instances * Exporting PostgreSQL data to Amazon S3 * Invoking a Lambda function from RDS for PostgreSQL * Lambda function and parameter reference * Common DBA tasks for RDS for PostgreSQL * Collations supported in RDS for PostgreSQL * Understanding PostgreSQL roles and permissions * Working with the PostgreSQL autovacuum * Managing temporary files with PostgreSQL * Working with parameters * Tuning with wait events for RDS for PostgreSQL * Essential concepts for RDS for PostgreSQL tuning * RDS for PostgreSQL wait events * Client:ClientRead * Client:ClientWrite * CPU * IO:BufFileRead and IO:BufFileWrite * IO:DataFileRead * IO:WALWrite * Lock:advisory * Lock:extend * Lock:Relation * Lock:transactionid * Lock:tuple * LWLock:BufferMapping (LWLock:buffer_mapping) * LWLock:BufferIO (IPC:BufferIO) * LWLock:buffer_content (BufferContent) * LWLock:lock_manager (LWLock:lockmanager) * Timeout:PgSleep * Timeout:VacuumDelay * Tuning RDS for PostgreSQL with Amazon DevOps Guru proactive insights * Database has long running idle in transaction connection * Using PostgreSQL extensions * Managing partitions with the pg_partman extension * Using pgAudit to log database activity * Scheduling maintenance with the pg_cron extension * Using pglogical to synchronize data * Managing spatial data with PostGIS * Supported foreign data wrappers * Working with Trusted Language Extensions for PostgreSQL * Functions reference for Trusted Language Extensions * pgtle.available_extensions * pgtle.available_extension_versions * pgtle.extension_update_paths * pgtle.install_extension * pgtle.install_update_path * pgtle.register_feature * pgtle.register_feature_if_not_exists * pgtle.set_default_version * pgtle.uninstall_extension * pgtle.uninstall_extension * pgtle.uninstall_extension_if_exists * pgtle.uninstall_update_path * pgtle.uninstall_update_path_if_exists * pgtle.unregister_feature * pgtle.unregister_feature_if_exists * Hooks reference for Trusted Language Extensions * Password check hook (passcheck) * Code examples * Actions * Create a DB instance * Create a DB parameter group * Create a snapshot of a DB instance * Create an authentication token * Delete a DB instance * Delete a DB parameter group * Describe DB instances * Describe DB parameter groups * Describe database engine versions * Describe options for DB instances * Describe parameters in a DB parameter group * Describe snapshots of DB instances * Modify a DB instance * Reboot a DB instance * Retrieve attributes * Update parameters in a DB parameter group * Scenarios * Get started with DB instances * Serverless examples * Connecting to an Amazon RDS database in a Lambda function * Cross-service examples * Create an Aurora Serverless work item tracker * Security * Database authentication * Password management with RDS and Secrets Manager * Data protection * Data encryption * Encrypting Amazon RDS resources * AWS KMS key management * Using SSL/TLS to encrypt a connection * Rotating your SSL/TLS certificate * Internetwork traffic privacy * Identity and access management * How Amazon RDS works with IAM * Identity-based policy examples * AWS managed policies * Policy updates * Cross-service confused deputy prevention * IAM database authentication * Enabling and disabling * Creating and using an IAM policy for IAM database access * Creating a database account using IAM authentication * Connecting to your DB instance using IAM authentication * Connecting using IAM: AWS CLI and mysql client * Connecting using IAM authentication from the command line: AWS CLI and psql client * Connecting using IAM authentication and the AWS SDK for .NET * Connecting using IAM authentication and the AWS SDK for Go * Connecting using IAM authentication and the AWS SDK for Java * Connecting using IAM authentication and the AWS SDK for Python (Boto3) * Troubleshooting * Logging and monitoring * Compliance validation * Resilience * Infrastructure security * VPC endpoints (AWS PrivateLink) * Security best practices * Controlling access with security groups * Master user account privileges * Service-linked roles * Using Amazon RDS with Amazon VPC * Working with a DB instance in a VPC * Updating the VPC for a DB instance * Scenarios for accessing a DB instance in a VPC * Tutorial: Create a VPC for use with a DB instance (IPv4 only) * Tutorial: Create a VPC for use with a DB instance (dual-stack mode) * Moving a DB instance into a VPC * Quotas and constraints * Troubleshooting * Amazon RDS API reference * Using the Query API * Troubleshooting applications * Document history * AWS Glossary Encrypting Amazon RDS resources - Amazon Relational Database Service AWSDocumentationAmazon RDSUser Guide Overview of encrypting Amazon RDS resourcesEncrypting a DB instanceDetermining whether encryption is turned on for a DB instanceAvailability of Amazon RDS encryptionEncryption in transitLimitations of Amazon RDS encrypted DB instances ENCRYPTING AMAZON RDS RESOURCES PDFRSS Amazon RDS can encrypt your Amazon RDS DB instances. Data that is encrypted at rest includes the underlying storage for DB instances, its automated backups, read replicas, and snapshots. Amazon RDS encrypted DB instances use the industry standard AES-256 encryption algorithm to encrypt your data on the server that hosts your Amazon RDS DB instances. After your data is encrypted, Amazon RDS handles authentication of access and decryption of your data transparently with a minimal impact on performance. You don't need to modify your database client applications to use encryption. NOTE For encrypted and unencrypted DB instances, data that is in transit between the source and the read replicas is encrypted, even when replicating across AWS Regions. TOPICS * Overview of encrypting Amazon RDS resources * Encrypting a DB instance * Determining whether encryption is turned on for a DB instance * Availability of Amazon RDS encryption * Encryption in transit * Limitations of Amazon RDS encrypted DB instances OVERVIEW OF ENCRYPTING AMAZON RDS RESOURCES Amazon RDS encrypted DB instances provide an additional layer of data protection by securing your data from unauthorized access to the underlying storage. You can use Amazon RDS encryption to increase data protection of your applications deployed in the cloud, and to fulfill compliance requirements for encryption at rest. For an Amazon RDS encrypted DB instance, all logs, backups, and snapshots are encrypted. Amazon RDS uses an AWS KMS key to encrypt these resources. For more information about KMS keys, see AWS KMS keys in the AWS Key Management Service Developer Guide and AWS KMS key management. If you copy an encrypted snapshot, you can use a different KMS key to encrypt the target snapshot than the one that was used to encrypt the source snapshot. A read replica of an Amazon RDS encrypted instance must be encrypted using the same KMS key as the primary DB instance when both are in the same AWS Region. If the primary DB instance and read replica are in different AWS Regions, you encrypt the read replica using the KMS key for that AWS Region. You can use an AWS managed key, or you can create customer managed keys. To manage the customer managed keys used for encrypting and decrypting your Amazon RDS resources, you use the AWS Key Management Service (AWS KMS). AWS KMS combines secure, highly available hardware and software to provide a key management system scaled for the cloud. Using AWS KMS, you can create customer managed keys and define the policies that control how these customer managed keys can be used. AWS KMS supports CloudTrail, so you can audit KMS key usage to verify that customer managed keys are being used appropriately. You can use your customer managed keys with Amazon Aurora and supported AWS services such as Amazon S3, Amazon EBS, and Amazon Redshift. For a list of services that are integrated with AWS KMS, see AWS Service Integration. Amazon RDS also supports encrypting an Oracle or SQL Server DB instance with Transparent Data Encryption (TDE). TDE can be used with RDS encryption at rest, although using TDE and RDS encryption at rest simultaneously might slightly affect the performance of your database. You must manage different keys for each encryption method. For more information on TDE, see Oracle Transparent Data Encryption or Support for Transparent Data Encryption in SQL Server. ENCRYPTING A DB INSTANCE To encrypt a new DB instance, choose Enable encryption on the Amazon RDS console. For information on creating a DB instance, see Creating an Amazon RDS DB instance. If you use the create-db-instance AWS CLI command to create an encrypted DB instance, set the --storage-encrypted parameter. If you use the CreateDBInstance API operation, set the StorageEncrypted parameter to true. When you create an encrypted DB instance, you can choose a customer managed key or the AWS managed key for Amazon RDS to encrypt your DB instance. If you don't specify the key identifier for a customer managed key, Amazon RDS uses the AWS managed key for your new DB instance. Amazon RDS creates an AWS managed key for Amazon RDS for your AWS account. Your AWS account has a different AWS managed key for Amazon RDS for each AWS Region. For more information about KMS keys, see AWS KMS keys in the AWS Key Management Service Developer Guide. Once you have created an encrypted DB instance, you can't change the KMS key used by that DB instance. Therefore, be sure to determine your KMS key requirements before you create your encrypted DB instance. If you use the AWS CLI create-db-instance command to create an encrypted DB instance with a customer managed key, set the --kms-key-id parameter to any key identifier for the KMS key. If you use the Amazon RDS API CreateDBInstance operation, set the KmsKeyId parameter to any key identifier for the KMS key. To use a customer managed key in a different AWS account, specify the key ARN or alias ARN. IMPORTANT Amazon RDS can lose access to the KMS key for a DB instance. For example, RDS loses access when the KMS key isn't enabled, or when RDS access to a KMS key is revoked. In these cases, the encrypted DB instance goes into inaccessible-encryption-credentials-recoverable state. The DB instance remains in this state for seven days. When you start the DB instance during that time, it checks if the KMS key is active and recovers the DB instance if it is. Restart the DB instance using the AWS CLI command start-db-instance or AWS Management Console. If the DB instance isn't recovered, then it goes into the terminal inaccessible-encryption-credentials state. In this case, you can only restore the DB instance from a backup. We strongly recommend that you always turn on backups for encrypted DB instances to guard against the loss of encrypted data in your databases. DETERMINING WHETHER ENCRYPTION IS TURNED ON FOR A DB INSTANCE You can use the AWS Management Console, AWS CLI, or RDS API to determine whether encryption at rest is turned on for a DB instance. TO DETERMINE WHETHER ENCRYPTION AT REST IS TURNED ON FOR A DB INSTANCE 1. Sign in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/. 2. In the navigation pane, choose Databases. 3. Choose the name of the DB instance that you want to check to view its details. 4. Choose the Configuration tab, and check the Encryption value under Storage. It shows either Enabled or Not enabled. CONSOLE TO DETERMINE WHETHER ENCRYPTION AT REST IS TURNED ON FOR A DB INSTANCE 1. Sign in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/. 2. In the navigation pane, choose Databases. 3. Choose the name of the DB instance that you want to check to view its details. 4. Choose the Configuration tab, and check the Encryption value under Storage. It shows either Enabled or Not enabled. To determine whether encryption at rest is turned on for a DB instance by using the AWS CLI, call the describe-db-instances command with the following option: * --db-instance-identifier – The name of the DB instance. The following example uses a query to return either TRUE or FALSE regarding encryption at rest for the mydb DB instance. EXAMPLE aws rds describe-db-instances --db-instance-identifier mydb --query "*[].{StorageEncrypted:StorageEncrypted}" --output text AWS CLI To determine whether encryption at rest is turned on for a DB instance by using the AWS CLI, call the describe-db-instances command with the following option: * --db-instance-identifier – The name of the DB instance. The following example uses a query to return either TRUE or FALSE regarding encryption at rest for the mydb DB instance. EXAMPLE aws rds describe-db-instances --db-instance-identifier mydb --query "*[].{StorageEncrypted:StorageEncrypted}" --output text To determine whether encryption at rest is turned on for a DB instance by using the Amazon RDS API, call the DescribeDBInstances operation with the following parameter: * DBInstanceIdentifier – The name of the DB instance. RDS API To determine whether encryption at rest is turned on for a DB instance by using the Amazon RDS API, call the DescribeDBInstances operation with the following parameter: * DBInstanceIdentifier – The name of the DB instance. AVAILABILITY OF AMAZON RDS ENCRYPTION Amazon RDS encryption is currently available for all database engines and storage types, except for SQL Server Express Edition. Amazon RDS encryption is available for most DB instance classes. The following table lists DB instance classes that don't support Amazon RDS encryption: Instance type Instance class General purpose (M1) db.m1.small db.m1.medium db.m1.large db.m1.xlarge Memory optimized (M2) db.m2.xlarge db.m2.2xlarge db.m2.4xlarge Burstable (T2) db.t2.micro ENCRYPTION IN TRANSIT AWS provides secure and private connectivity between DB instances of all types. In addition, some instance types use the offload capabilities of the underlying Nitro System hardware to automatically encrypt in-transit traffic between instances. This encryption uses Authenticated Encryption with Associated Data (AEAD) algorithms, with 256-bit encryption. There is no impact on network performance. To support this additional in-transit traffic encryption between instances, the following requirements must be met: * The instances use the following instance types: * General purpose: M6i, M6id, M6in, M6idn, M7g * Memory optimized: R6i, R6id, R6in, R6idn, R7g, X2idn, X2iedn, X2iezn * The instances are in the same AWS Region. * The instances are in the same VPC or peered VPCs, and the traffic does not pass through a virtual network device or service, such as a load balancer or a transit gateway. LIMITATIONS OF AMAZON RDS ENCRYPTED DB INSTANCES The following limitations exist for Amazon RDS encrypted DB instances: * You can only encrypt an Amazon RDS DB instance when you create it, not after the DB instance is created. However, because you can encrypt a copy of an unencrypted snapshot, you can effectively add encryption to an unencrypted DB instance. That is, you can create a snapshot of your DB instance, and then create an encrypted copy of that snapshot. You can then restore a DB instance from the encrypted snapshot, and thus you have an encrypted copy of your original DB instance. For more information, see Copying a DB snapshot. * You can't turn off encryption on an encrypted DB instance. * You can't create an encrypted snapshot of an unencrypted DB instance. * A snapshot of an encrypted DB instance must be encrypted using the same KMS key as the DB instance. * You can't have an encrypted read replica of an unencrypted DB instance or an unencrypted read replica of an encrypted DB instance. * Encrypted read replicas must be encrypted with the same KMS key as the source DB instance when both are in the same AWS Region. * You can't restore an unencrypted backup or snapshot to an encrypted DB instance. * To copy an encrypted snapshot from one AWS Region to another, you must specify the KMS key in the destination AWS Region. This is because KMS keys are specific to the AWS Region that they are created in. The source snapshot remains encrypted throughout the copy process. Amazon RDS uses envelope encryption to protect data during the copy process. For more information about envelope encryption, see Envelope encryption in the AWS Key Management Service Developer Guide. * You can't unencrypt an encrypted DB instance. However, you can export data from an encrypted DB instance and import the data into an unencrypted DB instance. Javascript is disabled or is unavailable in your browser. To use the Amazon Web Services Documentation, Javascript must be enabled. Please refer to your browser's Help pages for instructions. Document Conventions Data encryption AWS KMS key management Did this page help you? - Yes Thanks for letting us know we're doing a good job! If you've got a moment, please tell us what we did right so we can do more of it. Did this page help you? - No Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better. DID THIS PAGE HELP YOU? Yes No Provide feedback NEXT TOPIC: AWS KMS key management PREVIOUS TOPIC: Data encryption NEED HELP? * Try AWS re:Post * Connect with an AWS IQ expert PrivacySite termsCookie preferences © 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. ON THIS PAGE * Overview of encrypting Amazon RDS resources * Encrypting a DB instance * Determining whether encryption is turned on for a DB instance * Availability of Amazon RDS encryption * Encryption in transit * Limitations of Amazon RDS encrypted DB instances DID THIS PAGE HELP YOU? - NO Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better. Feedback