docs.aws.amazon.com Open in urlscan Pro
54.239.24.117  Public Scan

Submitted URL: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html#Overview.Encryption.Availability\n8.
Effective URL: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html
Submission: On September 01 via api from US

Form analysis 0 forms found in the DOM

Text Content

SELECT YOUR COOKIE PREFERENCES

We use cookies and similar tools to enhance your experience, provide our
services, deliver relevant advertising, and make improvements. Approved third
parties also use these tools to help us deliver advertising and provide certain
site features.

CustomizeAccept all


CUSTOMIZE COOKIE PREFERENCES

We use cookies and similar tools (collectively, "cookies") for the following
purposes.


ESSENTIAL

Essential cookies are necessary to provide our site and services and cannot be
deactivated. They are usually set in response to your actions on the site, such
as setting your privacy preferences, signing in, or filling in forms.




PERFORMANCE

Performance cookies provide anonymous statistics about how customers navigate
our site so we can improve site experience and performance. Approved third
parties may perform analytics on our behalf, but they cannot use the data for
their own purposes.

Allow performance category
Allowed


FUNCTIONAL

Functional cookies help us provide useful site features, remember your
preferences, and display relevant content. Approved third parties may set these
cookies to provide certain site features. If you do not allow these cookies,
then some or all of these services may not function properly.

Allow functional category
Allowed


ADVERTISING

Advertising cookies may be set through our site by us or our advertising
partners and help us deliver relevant marketing content. If you do not allow
these cookies, you will experience less relevant advertising.

Allow advertising category
Allowed

Blocking some types of cookies may impact your experience of our sites. You may
review and change your choices at any time by clicking Cookie preferences in the
footer of this site. We and selected third-parties use cookies or similar
technologies as specified in the AWS Cookie Notice

.

CancelSave preferences


English

Sign In to the Console
 1. AWS
 2. ...
 3. Documentation
 4. Amazon Relational Database Service (RDS)
 5. User Guide


Feedback
Preferences
Amazon Relational Database Service
User Guide
 * What is Amazon RDS?
    * DB instances
    * DB instance classes
    * DB instance storage
    * Regions, Availability Zones, and Local Zones
    * High availability (Multi-AZ)
    * DB instance billing for Amazon RDS
       * On-Demand DB instances
       * Reserved DB instances

 * Setting up
 * Getting started
    * Creating a MariaDB DB instance and connecting to a database
    * Creating a SQL Server DB instance and connecting to it
    * Creating a MySQL DB instance and connecting to a database
    * Creating an Oracle DB instance and connecting to a database
    * Creating a PostgreSQL DB instance and connecting to a database
    * Tutorial: Create a web server and an Amazon RDS DB instance
       * Create a DB instance
       * Create a web server

 * Tutorials
 * Best practices for Amazon RDS
 * Configuring a DB instance
    * Creating a DB instance
    * Creating resources with AWS CloudFormation
    * Connecting to a DB instance
       * Managing connections with RDS Proxy
   
    * Working with option groups
    * Working with parameter groups

 * Managing a DB instance
    * Stopping a DB instance
    * Starting a DB instance
    * Modifying a DB instance
    * Maintaining a DB instance
    * Upgrading the engine version
    * Renaming a DB instance
    * Rebooting a DB instance
    * Working with read replicas
       * Creating a read replica in a different AWS Region
   
    * Tagging RDS resources
    * Working with ARNs
    * Working with storage
    * Deleting a DB instance

 * Backing up and restoring a DB instance
    * Working with backups
    * Replicating automated backups to another Region
    * Creating a DB snapshot
    * Restoring from a DB snapshot
    * Copying a snapshot
    * Sharing a snapshot
    * Exporting snapshot data to Amazon S3
    * Point-in-time recovery
    * Deleting a snapshot
    * Tutorial: Restore a DB instance from a DB snapshot

 * Monitoring a DB instance
    * Overview of monitoring
    * Viewing key monitoring information
    * Monitoring RDS with CloudWatch
    * Monitoring with Performance Insights
       * Overview
          * DB load
          * Maximum CPU
          * Amazon RDS DB engine support for Performance Insights
          * AWS Region support for Performance Insights
      
       * Enabling and disabling Performance Insights
       * Enabling the Performance Schema for MariaDB or MySQL
       * Performance Insights policies
       * Analyzing metrics with the Performance Insights dashboard
       * Customizing the Performance Insights dashboard
       * Retrieving metrics with the Performance Insights API
       * Metrics published to CloudWatch
       * Logging Performance Insights calls using AWS CloudTrail
   
    * Monitoring OS metrics
       * Overview of Enhanced Monitoring
       * Setting up and enabling Enhanced Monitoring
       * Viewing OS metrics in the RDS console
       * Viewing OS metrics using CloudWatch Logs
   
    * Working with Amazon RDS events
       * Overview of events for Amazon RDS
       * Viewing Amazon RDS events
       * Using Amazon RDS event notification
          * Amazon RDS event categories and event messages
          * Subscribing to Amazon RDS event notification
          * Listing Amazon RDS event notification subscriptions
          * Modifying an Amazon RDS event notification subscription
          * Adding a source identifier to an Amazon RDS event notification
            subscription
          * Removing a source identifier from an Amazon RDS event notification
            subscription
          * Listing the Amazon RDS event notification categories
          * Deleting an Amazon RDS event notification subscription
      
       * Creating a rule that triggers on an Amazon RDS event
   
    * Working with database logs
       * MariaDB database log files
       * Microsoft SQL Server database log files
       * MySQL database log files
          * Overview of MySQL database logs
          * Accessing MySQL error logs
          * Accessing the MySQL slow query and general logs
          * Accessing the MySQL audit log
          * Publishing MySQL logs to Amazon CloudWatch Logs
          * Managing table-based MySQL logs
          * Setting the binary logging format
          * Accessing MySQL binary logs
      
       * Oracle database log files
       * PostgreSQL database log files
   
    * Working with AWS CloudTrail and Amazon RDS
    * Using Database Activity Streams
       * Overview
       * Configuring Oracle unified auditing
       * Starting a database activity stream
       * Getting activity stream status
       * Stopping a database activity stream
       * Monitoring activity streams
       * Managing access to activity streams

 * Working with RDS on AWS Outposts
 * MariaDB on Amazon RDS
    * Connecting to a DB instance running MariaDB
    * Updating applications for new SSL/TLS certificates
    * Upgrading the MariaDB DB engine
    * Working with MariaDB replication
       * Working with MariaDB read replicas
       * Configuring GTID-based replication
   
    * Importing data into a MariaDB DB instance
    * Options for MariaDB
    * Parameters for MariaDB
    * MariaDB on Amazon RDS SQL reference
       * mysql.rds_replica_status
       * mysql.rds_set_external_master_gtid
       * mysql.rds_kill_query_id

 * Microsoft SQL Server on Amazon RDS
    * Licensing SQL Server on Amazon RDS
    * Connecting to a DB instance running SQL Server
    * Updating applications for new SSL/TLS certificates
    * Upgrading the SQL Server DB engine
    * Importing and exporting SQL Server databases
       * Importing and exporting SQL Server data using other methods
   
    * Working with SQL Server read replicas
    * Multi-AZ for RDS for SQL Server
    * Additional features for SQL Server
       * Using SSL with a SQL Server DB instance
       * Configuring security protocols and ciphers
       * Using Windows Authentication with a SQL Server DB instance
       * Amazon S3 integration
       * Using Database Mail
       * Instance store support for tempdb
       * Using extended events
   
    * Options for SQL Server
       * Native backup and restore
       * Transparent Data Encryption
          * Performance considerations
      
       * SQL Server Audit
       * SQL Server Analysis Services
       * SQL Server Integration Services
       * SQL Server Reporting Services
       * Microsoft Distributed Transaction Coordinator
   
    * Common DBA tasks for SQL Server
       * Accessing the tempdb database
       * Analyzing database workload with Database Engine Tuning Advisor
       * Collations and character sets
       * Creating a database user
       * Determining a recovery model
       * Determining the last failover time
       * Disabling fast inserts
       * Dropping a SQL Server database
       * Renaming a Multi-AZ database
       * Resetting the db_owner role password
       * Restoring license-terminated DB instances
       * Transitioning a database from OFFLINE to ONLINE
       * Using CDC
       * Using SQL Server Agent
       * Working with SQL Server logs
       * Working with trace and dump files

 * MySQL on Amazon RDS
    * Connecting to a DB instance running MySQL
    * Updating applications for new SSL/TLS certificates
    * Upgrading the MySQL DB engine
    * Upgrading a MySQL DB snapshot
    * Importing data into a MySQL DB instance
       * Restoring a backup into an Amazon RDS MySQL DB instance
       * Importing data from a MySQL or MariaDB DB to a MySQL or MariaDB DB
         instance
       * Importing data to an Amazon RDS MySQL or MariaDB DB instance with
         reduced downtime
       * Importing data from any source to a MySQL or MariaDB DB instance
   
    * Working with MySQL replication
       * Working with MySQL read replicas
       * Using GTID-based replication
       * Replication with a MySQL or MariaDB instance running external to Amazon
         RDS
   
    * Exporting data from a MySQL DB instance
    * Options for MySQL
       * MariaDB Audit Plugin
       * memcached
   
    * Common DBA tasks for MySQL
    * Using Kerberos authentication for MySQL
    * Known issues and limitations
    * MySQL on Amazon RDS SQL reference
       * mysql.rds_set_master_auto_position
       * mysql.rds_set_external_master
       * mysql.rds_set_external_master_with_delay
       * mysql.rds_set_external_master_with_auto_position
       * mysql.rds_reset_external_master
       * mysql.rds_import_binlog_ssl_material
       * mysql.rds_remove_binlog_ssl_material
       * mysql.rds_set_source_delay
       * mysql.rds_start_replication
       * mysql.rds_start_replication_until
       * mysql.rds_start_replication_until_gtid
       * mysql.rds_stop_replication
       * mysql.rds_skip_transaction_with_gtid
       * mysql.rds_skip_repl_error
       * mysql.rds_next_master_log
       * mysql.rds_innodb_buffer_pool_dump_now
       * mysql.rds_innodb_buffer_pool_load_now
       * mysql.rds_innodb_buffer_pool_load_abort
       * mysql.rds_set_configuration
       * mysql.rds_show_configuration
       * mysql.rds_kill
       * mysql.rds_kill_query
       * mysql.rds_rotate_general_log
       * mysql.rds_rotate_slow_log
       * mysql.rds_enable_gsh_collector
       * mysql.rds_set_gsh_collector
       * mysql.rds_disable_gsh_collector
       * mysql.rds_collect_global_status_history
       * mysql.rds_enable_gsh_rotation
       * mysql.rds_set_gsh_rotation
       * mysql.rds_disable_gsh_rotation
       * mysql.rds_rotate_global_status_history

 * Oracle on Amazon RDS
    * Oracle overview
       * Oracle features
       * Oracle versions
       * Oracle licensing
       * Oracle instance classes
       * Oracle architecture
       * Oracle parameters
       * Oracle character sets
       * Oracle limitations
   
    * Connecting to an Oracle instance
    * Securing Oracle connections
       * Encrypting with SSL
       * Using new SSL/TLS certificates
       * Configuring Kerberos authentication
          * Setting up
          * Managing a DB instance
          * Connecting with Kerberos authentication
      
       * Configuring outbound network access
   
    * Administering your Oracle DB
       * System tasks
       * Database tasks
       * Log tasks
       * RMAN tasks
       * Oracle Scheduler tasks
       * Diagnostic tasks
       * Other tasks
   
    * Importing data into Oracle
    * Working with Oracle replicas
    * Options for Oracle
       * Overview of Oracle DB options
       * Amazon S3 integration
       * Application Express (APEX)
       * Enterprise Manager
          * OEM Database Express
          * OEM Management Agent
      
       * Java virtual machine (JVM)
       * Label security
       * Locator
       * Multimedia
       * Native network encryption (NNE)
       * OLAP
       * Secure Sockets Layer (SSL)
       * Spatial
       * SQLT
       * Statspack
       * Time zone
       * Time zone file autoupgrade
       * Transparent Data Encryption (TDE)
       * UTL_MAIL
       * XML DB
   
    * Upgrading the Oracle DB engine
    * Upgrading an Oracle DB snapshot
    * Tools and third-party software for Oracle
       * Setting up
       * Using Oracle GoldenGate
       * Using the Oracle Repository Creation Utility
       * Installing a Siebel database on Oracle on Amazon RDS
   
    * Oracle database engine release notes
       * Database engine: 19.0.0.0
       * Database engine: 18.0.0.0
       * Database engine: 12.2.0.1
       * Database engine: 12.1.0.2
       * Database engine: 11.2.0.4

 * PostgreSQL on Amazon RDS
    * Connecting to a PostgreSQL instance
    * Security with RDS for PostgreSQL
       * Using SSL with a PostgreSQL DB instance
       * Using new SSL/TLS certificates in applications
       * Using Kerberos authentication
          * Setting up
          * Managing a DB instance in a Domain
          * Connecting with Kerberos authentication
   
    * Upgrading the PostgreSQL DB engine
    * Upgrading a PostgreSQL DB snapshot engine version
    * Working with PostgreSQL read replicas
    * Importing data into PostgreSQL
    * Exporting PostgreSQL data to Amazon S3
    * Common DBA tasks for PostgreSQL
       * Working with PostgreSQL autovacuum
       * Working with the PostGIS extension
       * Using a custom DNS server for outbound network access
       * Scheduling maintenance with the pg_cron extension
       * Managing partitions with the pg_partman extension
       * Invoking a Lambda function from RDS for PostgreSQL

 * Security
    * Database authentication
    * Data protection
       * Data encryption
          * Encrypting Amazon RDS resources
          * Customer master key (CMK) management
          * Using SSL/TLS to encrypt a connection
          * Rotating your SSL/TLS certificate
      
       * Internetwork traffic privacy
   
    * Identity and access management
       * How Amazon RDS works with IAM
       * Identity-based policy examples
       * IAM database authentication for MySQL and PostgreSQL
          * Enabling and disabling
          * Creating and using an IAM policy for IAM database access
          * Creating a database account using IAM authentication
          * Connecting to your DB instance using IAM authentication
             * Connecting using IAM: AWS CLI and mysql client
             * Connecting using IAM authentication from the command line: AWS
               CLI and psql client
             * Connecting using IAM authentication and the AWS SDK for .NET
             * Connecting using IAM authentication and the AWS SDK for Go
             * Connecting using IAM authentication and the AWS SDK for Java
             * Connecting using IAM authentication and the AWS SDK for Python
               (Boto3)
      
       * Troubleshooting
   
    * Logging and monitoring
    * Compliance validation
    * Resilience
    * Infrastructure security
    * VPC endpoints (AWS PrivateLink)
    * Security best practices
    * Controlling access with security groups
       * DB security groups on EC2-Classic
   
    * Master user account privileges
    * Service-linked roles
    * Using Amazon RDS with Amazon VPC
       * Determining whether you are using the EC2-VPC or EC2-Classic platform
       * Scenarios for accessing a DB instance in a VPC
          * Scenarios for accessing a DB instance not in a VPC
      
       * Working with a DB instance in a VPC
       * Tutorial: Create an Amazon VPC for use with a DB instance

 * Quotas and constraints
 * Troubleshooting
 * Amazon RDS API reference
    * Using the Query API
    * Troubleshooting applications

 * Document history
 * AWS glossary


Encrypting Amazon RDS resources - Amazon Relational Database Service
AWSDocumentationAmazon Relational Database Service (RDS)User Guide
Overview of encrypting Amazon RDS resourcesEnabling Amazon RDS encryption for a
DB instanceAvailability of Amazon RDS encryptionLimitations of Amazon RDS
encrypted DB instances


ENCRYPTING AMAZON RDS RESOURCES

PDF
Kindle
RSS

Amazon RDS can encrypt your Amazon RDS DB instances. Data that is encrypted at
rest includes the underlying storage for DB instances, its automated backups,
read replicas, and snapshots.

Amazon RDS encrypted DB instances use the industry standard AES-256 encryption
algorithm to encrypt your data on the server that hosts your Amazon RDS DB
instances. After your data is encrypted, Amazon RDS handles authentication of
access and decryption of your data transparently with a minimal impact on
performance. You don't need to modify your database client applications to use
encryption.

Note

For encrypted and unencrypted DB instances, data that is in transit between the
source and the read replicas is encrypted, even when replicating across AWS
Regions.

Topics

 * Overview of encrypting Amazon RDS resources
 * Enabling Amazon RDS encryption for a DB instance
 * Availability of Amazon RDS encryption
 * Limitations of Amazon RDS encrypted DB instances


OVERVIEW OF ENCRYPTING AMAZON RDS RESOURCES

Amazon RDS encrypted DB instances provide an additional layer of data protection
by securing your data from unauthorized access to the underlying storage. You
can use Amazon RDS encryption to increase data protection of your applications
deployed in the cloud, and to fulfill compliance requirements for encryption at
rest.

Amazon RDS also supports encrypting an Oracle or SQL Server DB instance with
Transparent Data Encryption (TDE). TDE can be used with encryption at rest,
although using TDE and encryption at rest simultaneously might slightly affect
the performance of your database. You must manage different keys for each
encryption method. For more information on TDE, see Oracle Transparent Data
Encryption or Support for Transparent Data Encryption in SQL Server.

For an Amazon RDS encrypted DB instance, all logs, backups, and snapshots are
encrypted. Amazon RDS uses an AWS KMS customer master key (CMK) to encrypt these
resources. For more information about CMKs, see Customer master keys (CMKs) in
the AWS Key Management Service Developer Guide. If you copy an encrypted
snapshot, you can use a different CMK to encrypt the target snapshot than the
one that was used to encrypt the source snapshot.

A read replica of an Amazon RDS encrypted instance must be encrypted using the
same CMK as the primary DB instance when both are in the same AWS Region. If the
primary DB instance and read replica are in different AWS Regions, you encrypt
the read replica using the CMK for that AWS Region.

To manage the customer master keys (CMKs) used for encrypting and decrypting
your Amazon RDS resources, you use the AWS Key Management Service (AWS KMS). AWS
KMS combines secure, highly available hardware and software to provide a key
management system scaled for the cloud. Using AWS KMS, you can create CMKs and
define the policies that control how these CMKs can be used. AWS KMS supports
CloudTrail, so you can audit CMK usage to verify that CMKs are being used
appropriately. You can use your CMKs with Amazon RDS and supported AWS services
such as Amazon S3, Amazon EBS, and Amazon Redshift. For a list of services that
are integrated with AWS KMS, see Supported services in the AWS Key Management
Service Developer Guide.


ENABLING AMAZON RDS ENCRYPTION FOR A DB INSTANCE

To enable encryption for a new DB instance, choose Enable encryption on the
Amazon RDS console. For information on creating a DB instance, see Creating an
Amazon RDS DB instance.

If you use the create-db-instance AWS CLI command to create an encrypted DB
instance, set the --storage-encrypted parameter. If you use the CreateDBInstance
API operation, set the StorageEncrypted parameter to true.

When you create an encrypted DB instance, you can choose a customer managed CMK
or the AWS managed CMK for Amazon RDS to encrypt your DB instance. If you don't
specify the key identifier for a customer managed CMK, Amazon RDS uses the AWS
managed CMK for your new DB instance. Amazon RDS creates an AWS managed CMK for
Amazon RDS for your AWS account. Your AWS account has a different AWS managed
CMK for Amazon RDS for each AWS Region.

Once you have created an encrypted DB instance, you can't change the CMK used by
that DB instance. Therefore, be sure to determine your CMK requirements before
you create your encrypted DB instance.

If you use the AWS CLI create-db-instance command to create an encrypted DB
instance with a customer managed CMK, set the --kms-key-id parameter to any key
identifier for the CMK. If you use the Amazon RDS API CreateDBInstance
operation, set the KmsKeyId parameter to any key identifier for the CMK. To use
a customer managed CMK in a different AWS account, specify the key ARN or alias
ARN.

Important

If Amazon RDS loses access to the CMK for a DB instance—for example, when RDS
access to a CMK is revoked—then the encrypted DB instance goes into a terminal
state. In this case, you can only restore the DB instance from a backup. We
strongly recommend that you always enable backups for encrypted DB instances to
guard against the loss of encrypted data in your databases.


AVAILABILITY OF AMAZON RDS ENCRYPTION

Amazon RDS encryption is currently available for all database engines and
storage types.

Amazon RDS encryption is available for most DB instance classes. The following
table lists DB instance classes that do not support Amazon RDS encryption:

Instance type Instance class

General purpose (M1)

db.m1.small

db.m1.medium

db.m1.large

db.m1.xlarge

Memory optimized (M2)

db.m2.xlarge

db.m2.2xlarge

db.m2.4xlarge

Burstable (T2)

db.t2.micro

Note

Encryption at rest is not available for DB instances running SQL Server Express
Edition.


LIMITATIONS OF AMAZON RDS ENCRYPTED DB INSTANCES

The following limitations exist for Amazon RDS encrypted DB instances:

 * You can only enable encryption for an Amazon RDS DB instance when you create
   it, not after the DB instance is created.
   
   However, because you can encrypt a copy of an unencrypted snapshot, you can
   effectively add encryption to an unencrypted DB instance. That is, you can
   create a snapshot of your DB instance, and then create an encrypted copy of
   that snapshot. You can then restore a DB instance from the encrypted
   snapshot, and thus you have an encrypted copy of your original DB instance.
   For more information, see Copying a snapshot.

 * You can't disable encryption on an encrypted DB instance.

 * You can't create an encrypted snapshot of an unencrypted DB instance.

 * A snapshot of an encrypted DB instance must be encrypted using the same CMK
   as the DB instance.

 * You can't have an encrypted read replica of an unencrypted DB instance or an
   unencrypted read replica of an encrypted DB instance.

 * Encrypted read replicas must be encrypted with the same CMK as the source DB
   instance when both are in the same AWS Region.

 * You can't restore an unencrypted backup or snapshot to an encrypted DB
   instance.

 * To copy an encrypted snapshot from one AWS Region to another, you must
   specify the CMK in the destination AWS Region. This is because CMKs are
   specific to the AWS Region that they are created in.
   
   The source snapshot remains encrypted throughout the copy process. Amazon RDS
   uses envelope encryption to protect data during the copy process. For more
   information about envelope encryption, see Envelope encryption in the AWS Key
   Management Service Developer Guide.

 * You can't unencrypt an encrypted DB instance. However, you can export data
   from an encrypted DB instance and import the data into an unencrypted DB
   instance.

© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thanks for your vote. To provide details, send feedback.

This page is helpful.

Thanks for your vote. To provide details, send feedback.

This page is not helpful.


Javascript is disabled or is unavailable in your browser.

To use the Amazon Web Services Documentation, Javascript must be enabled. Please
refer to your browser's Help pages for instructions.

Document Conventions
Data encryption
Customer master key (CMK) management
Did this page help you?
Yes No

Did this page help you? - Yes

Thanks for letting us know we're doing a good job!

If you've got a moment, please tell us what we did right so we can do more of
it.

Feedback




Did this page help you? - No

Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.

Feedback




Provide feedback

Edit this page on GitHub
Previous topic: Data encryption

Next topic: Customer master key (CMK) management
Need help?
   
 * Try the forums
   
   
 * Connect with an AWS IQ expert
   

Privacy
Site terms
Cookie preferences
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Did this page help you? - Yes

Thanks for letting us know we're doing a good job!

If you've got a moment, please tell us what we did right so we can do more of
it.

Feedback

Did this page help you? - No

Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.

Feedback


On this page
 * Overview of encrypting Amazon RDS resources
 * Enabling Amazon RDS encryption for a DB instance
 * Availability of Amazon RDS encryption
 * Limitations of Amazon RDS encrypted DB instances