We also give you the control and visibility you need to help demonstrate that you comply with regional and local data privacy laws and regulations. We provide tools that allow you to easily encrypt your data in transit and at rest to help ensure that only authorized users can access it, using keys managed by our AWS Key Management System (KMS) or managing your own encryption keys with CloudHSM using FIPS 140-2 Level 3 validated HSMs. Additional encryption layers exist as well for example, all VPC cross-region peering traffic, and customer or service-to-service TLS connections. ![]() All data flowing across the AWS global network that interconnects our datacenters and regions is automatically encrypted at the physical layer before it leaves our secured facilities. With AWS you can build on the most secure global infrastructure, knowing you always own your data, including the ability to encrypt it, move it, and manage retention. ![]() Because our customers care deeply about data security, we have a world-class team of security experts monitoring our systems 24x7 to protect your content.
0 Comments
Leave a Reply. |