AWS In Practice
Courses
  • Welcome to AWS In Practice by IT Assist Labs!
  • Courses
    • AWS Powered E-commerce Application: A Guided Tour
      • Lesson Learning Paths
        • Lesson Learning Paths - Certification Prep
        • Lesson Learning Paths - Interview Prep
      • Lesson Summaries
        • Introduction
          • E-commerce Application Architecture
        • Multi-Account Strategy
          • Multi-Account Strategy Overview
          • Organization Units
          • Core Accounts
        • Core Microservices
          • Services Overview
          • AWS Well-Architected design framework application
          • Site Reliability Engineering Application
          • DevOps Application
          • Monitoring, Logging and Observability Application
        • AWS Service By Layer
          • AWS Service By Layer Overview
          • Presentation Layer
          • Business Logic Layer
          • Data Layer
        • E-commerce Application Use Cases
          • E-commerce Application Use Cases
          • Roles
      • Lesson Content Navigation Demonstration
    • Explore a Live AWS Environment Powering an E-commerce Application
  • Resources
    • AWS Certification Guide
      • Concepts
        • Security, Identity & Compliance
          • AWS IAM-Related Concepts in Certification Exams
        • Design High-Performing Architectures
          • Designing a high-performing architecture with EC2 and Auto Scaling Groups (ASGs)
    • Insights
      • Zero Trust Architecture (ZTA)
      • Implementing a Zero Trust Architecture(ZTA) with AWS
      • The Modern Application Development Lifecycle - Blue/Green Deployments
      • Microservices Communication Patterns
    • Interview Preparation
      • AWS Solutions Archictect
  • AWS Exploration
    • Use Cases
      • Multi-Region Resiliency with Active-Active Setup
        • Exploration Summary
    • Foundational Solutions Architect Use Cases
    • Security Engineer / Cloud Security Architect Use Cases
    • DevOps / Site Reliability Engineer (SRE) Use Cases
    • Cloud Engineer / Cloud Developer
    • Data Engineer Use Cases
    • Machine Learning Engineer / AI Practitioner Use Cases
    • Network Engineer (Cloud) Use Cases
    • Cost Optimization / FinOps Practitioner Use Cases
    • IT Operations / Systems Administrator Use Cases
  • Study Group
    • AWS Certified Solutions Architect - Associate
      • Study Guide Introduction
      • Domain 1: Design Secure Architectures
        • Task Statement 1.1: Design secure access to AWS resources
          • SecureCart's Journey
          • AWS Identity & Access Management (IAM) Fundamentals
          • AWS Security Token Service (STS)
          • AWS Organization
          • IAM Identity Center
          • AWS Policies
          • Federated Access
          • Directory Service
          • Managing Access Across Multiple Accounts
          • Authorization Models in IAM
          • AWS Control Tower
          • AWS Service Control Policies (SCPs)
          • Use Cases
            • Using IAM Policies and Tags for Access Control in AWS
        • Task Statement 1.2: Design Secure Workloads and Applications
          • SecureCart Journey
          • Application Configuration & Credential Security
          • Copy of Application Configuration & Credential Security
          • Network Segmentation Strategies & Traffic Control
          • Securing Network Traffic & AWS Service Endpoints
          • Protecting Applications from External Threats
          • Securing External Network Connections
          • AWS Network Firewall
          • AWS Firewall Manager
          • IAM Authentication Works with Databases
          • AWS WAF (Web Application Firewall)
          • Use Cases
            • AWS Endpoint Policy for Trusted S3 Buckets
            • Increasing Fault Tolerance for AWS Direct Connect in SecureCart’s Multi-VPC Network
            • Securing Multi-Domain SSL with ALB in SecureCart Using SNI-Based SSL
            • Configuring a Custom Domain Name for API Gateway with AWS Certificate Manager and Route 53
            • Application Load Balancer (ALB) – Redirecting HTTP to HTTPS
            • Security Considerations in ALB Logging & Monitoring
          • Amazon CloudFront and Different Origin Use Cases
          • Security Group
          • CloudFront
          • NACL
          • Amazon Cognito
          • VPC Endpoint
        • Task Statement 1.3: Determine appropriate data security controls
          • SecureCart Journey
          • Data Access & Governance
          • Data Encryption & Key Management
          • Data Retention, Classification & Compliance
          • Data Backup, Replication & Recovery
          • Managing Data Lifecycle & Protection Policies
          • KMS
          • S3 Security Measures
          • KMS Use Cases
          • Use Cases
            • Safely Storing Sensitive Data on EBS and S3
            • Managing Compliance & Security with AWS Config
            • Preventing Sensitive Data Exposure in Amazon S3
            • Encrypting EBS Volumes for HIPAA Compliance
            • EBS Encryption Behavior
            • Using EBS Volume While Snapshot is in Progress
          • Compliance
          • Implementing Access Policies for Encryption Keys
          • Rotating Encryption Keys and Renewing Certificates
          • Implementing Policies for Data Access, Lifecycle, and Protection
          • Rotating encryption keys and renewing certificates
          • Instance Store
          • AWS License Manager
          • Glacier
          • AWS CloudHSM Key Management & Zeroization Protection
          • EBS
        • AWS Security Services
        • Use Cases
          • IAM Policy & Directory Setup for S3 Access via Single Sign-On (SSO)
          • Federating AWS Access with Active Directory (AD FS) for Hybrid Cloud Access
      • Domain 2
        • Task Statement 2.1: Design Scalable and Loosely Coupled Architectures
          • SecureCart Journey
          • API Creation & Management
          • Microservices & Event-Driven Architectures
          • Load Balancing & Scaling Strategies
          • Caching Strategies & Edge Acceleration
          • Serverless & Containerization
          • Workflow Orchestration & Multi-Tier Architectures
        • Task Statement 2.2: Design highly available and/or fault-tolerant architectures
          • SecureCart Journey
          • AWS Global Infrastructure & Distributed Design
          • Load Balancing & Failover Strategies
          • Disaster Recovery (DR) Strategies & Business Continuity
          • Automation & Immutable Infrastructure
          • Monitoring & Workload Visibility
          • Use Cases
            • Amazon RDS Failover Events & Automatic Failover Mechanism
      • Domain 3
        • Task Statement 3.1: Determine high-performing and/or scalable storage solutions
          • SecureCart Journey
          • Understanding AWS Storage Types & Use Cases
          • Storage Performance & Configuration Best Practices
          • Scalable & High-Performance Storage Architectures
          • Hybrid & Multi-Cloud Storage Solutions
          • Storage Optimization & Cost Efficiency
          • Hands-on Labs & Final Challenge
        • Task Statement 3.2: Design High-Performing and Elastic Compute Solutions
          • SecureCart
          • AWS Compute Services & Use Cases
          • Elastic & Auto-Scaling Compute Architectures
          • Decoupling Workloads for Performance
          • Serverless & Containerized Compute Solutions
          • Compute Optimization & Cost Efficiency
        • Task Statement 3.3: Determine High-Performing Database Solutions
          • SecureCart Journey
          • AWS Database Types & Use Cases
          • Database Performance Optimization
          • Caching Strategies for High-Performance Applications
          • Database Scaling & Replication
          • High Availability & Disaster Recovery for Databases
        • Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures
          • SecureCart Journey
          • AWS Networking Fundamentals & Edge Services
          • Network Architecture & Routing Strategies
          • Load Balancing for Scalability & High Availability
          • Hybrid & Private Network Connectivity
          • Optimizing Network Performance
          • Site-to-Site VPN Integration for SAP HANA in AWS
        • Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions
          • SecureCart Journey
          • Data Ingestion Strategies & Patterns
          • Data Transformation & ETL Pipelines
          • Secure & Scalable Data Transfer
          • Building & Managing Data Lakes
          • Data Visualization & Analytics
      • Domain 4
        • Task Statement 4.1: Design Cost-Optimized Storage Solutions
          • SecureCart Journey
          • AWS Storage Services & Cost Optimization
          • Storage Tiering & Auto Scaling
          • Data Lifecycle Management & Archival Strategies
          • Hybrid Storage & Data Migration Cost Optimization
          • Cost-Optimized Backup & Disaster Recovery
        • Task Statement 4.2: Design Cost-Optimized Compute Solutions
          • SecureCart Journey
          • AWS Compute Options & Cost Management Tools
          • Compute Purchasing Models & Optimization
          • Scaling Strategies for Cost Efficiency
          • Serverless & Container-Based Cost Optimization
          • Hybrid & Edge Compute Cost Strategies
          • AWS License Manager
        • Task Statement 4.3: Design cost-optimized database solutions
          • SecureCart Journey
          • AWS Database Services & Cost Optimization Tools
          • Database Sizing, Scaling & Capacity Planning
          • Caching Strategies for Cost Efficiency
          • Backup, Retention & Disaster Recovery
          • Cost-Optimized Database Migration Strategies
        • Task Statement 4.4: Design Cost-Optimized Network Architectures
          • SecureCart Journey
          • AWS Network Cost Management & Monitoring
          • Load Balancing & NAT Gateway Cost Optimization
          • Network Connectivity & Peering Strategies
          • Optimizing Data Transfer & Network Routing Costs
          • Content Delivery Network & Edge Caching
      • Week Nine
        • Final Review Session
        • Final Practice Test
Powered by GitBook

@ 2024 IT Assist LLC

On this page
  • πŸ”Ή Step 1: Understanding Data Classification
  • πŸ”Ή Step 2: Implementing Data Retention Policies
  • πŸ”Ή Step 3: Ensuring Data Compliance with AWS Governance Services
  • πŸ”Ή Step 4: Implementing Secure Data Deletion & Compliance Management
  • πŸ”Ή Step 5: Continuous Monitoring & Auditing for Compliance
  • πŸš€ Summary
  1. Study Group
  2. AWS Certified Solutions Architect - Associate
  3. Domain 1: Design Secure Architectures
  4. Task Statement 1.3: Determine appropriate data security controls

Data Retention, Classification & Compliance

Data retention, classification, and compliance are key components of SecureCart's data governance strategy. They ensure that data is stored securely, classified correctly, and retained only as long as necessary to meet legal, regulatory, and operational requirements.

βœ” Why is Data Retention, Classification & Compliance important for SecureCart?

  • Prevents unauthorized access to sensitive customer data.

  • Ensures compliance with industry regulations (PCI DSS, GDPR, HIPAA).

  • Optimizes storage costs by managing data lifecycles effectively.

  • Reduces risk of legal penalties by implementing proper data governance policies.


πŸ”Ή Step 1: Understanding Data Classification

Data classification helps categorize data based on sensitivity and importance to enforce appropriate security controls. SecureCart uses Amazon Macie and AWS Tags to classify data automatically.

A. Data Classification Levels

Classification Level

Description

Example Data in SecureCart

Public Data

Data that can be accessed by anyone.

Product descriptions, FAQs.

Internal Data

Used within SecureCart but not exposed to customers.

System logs, application performance metrics.

Confidential Data

Restricted access, requires encryption.

Customer contact details, transaction history.

Highly Sensitive Data

Critical data requiring strongest security controls.

Credit card details, payment processing records.

βœ… Best Practices: βœ” Classify data automatically using Amazon Macie. βœ” Tag sensitive data with AWS Resource Tags for security and compliance tracking. βœ” Apply appropriate access controls based on data classification.


πŸ”Ή Step 2: Implementing Data Retention Policies

βœ” Why? – Data retention ensures that SecureCart keeps data only as long as necessary while optimizing costs.

Data Type

Retention Policy

Storage Class

Order Logs

Archive after 30 days, delete after 1 year.

Amazon S3 Glacier.

Customer Data

Delete after 5 years (GDPR Compliance).

Amazon RDS with backup retention.

Security Logs

Retain for 1 year for auditing.

Amazon S3 Standard-IA.

Billing Records

Retain for 7 years for financial compliance.

Amazon S3 Intelligent-Tiering.

A. Automating Data Retention with AWS Services

SecureCart uses AWS S3 Lifecycle Policies, RDS backup retention, and DynamoDB TTL (Time-to-Live) to automate data retention.

AWS Service

Retention Strategy

Amazon S3 Lifecycle Rules

Moves logs to Glacier after 30 days, deletes after 1 year.

Amazon RDS Backup Retention

Keeps automated backups for 7 days, long-term backups in Glacier.

DynamoDB TTL

Automatically deletes expired session data.

βœ… Best Practices: βœ” Use S3 Lifecycle Policies to automatically transition old data to low-cost storage. βœ” Apply DynamoDB TTL for temporary session data to free up storage. βœ” Ensure compliance with GDPR & PCI DSS by defining clear data retention policies.


πŸ”Ή Step 3: Ensuring Data Compliance with AWS Governance Services

SecureCart follows legal and regulatory compliance frameworks by implementing AWS governance tools.

Regulatory Compliance

Requirement

AWS Service Used

PCI DSS (Payment Security)

Encrypt payment transactions.

AWS KMS, Amazon RDS Encryption.

GDPR (Data Privacy)

Retain customer data for a limited time.

Amazon S3 Lifecycle Policies, AWS Macie.

HIPAA (Healthcare Compliance)

Securely store medical-related records.

AWS Config, IAM Policies.

SOC 2 (Operational Security)

Monitor access logs for security events.

AWS CloudTrail, GuardDuty.

A. Automating Compliance Audits with AWS Services

βœ” AWS Config – Continuously checks whether data storage complies with SecureCart’s policies. βœ” AWS Security Hub – Aggregates security findings across all AWS accounts. βœ” AWS CloudTrail – Logs all API activity for audit purposes.

βœ… Best Practices: βœ” Enable AWS Config Rules to detect misconfigured data retention settings. βœ” Use AWS Security Hub to consolidate security and compliance alerts. βœ” Regularly audit CloudTrail logs for suspicious access patterns.


πŸ”Ή Step 4: Implementing Secure Data Deletion & Compliance Management

βœ” Why? – Ensures that data is securely deleted when retention periods expire while maintaining compliance.

Secure Deletion Method

Use Case in SecureCart

Amazon S3 Object Expiration

Automatically deletes old logs & temporary files.

AWS KMS Key Deletion

Removes encryption keys for data no longer needed.

RDS Snapshot Expiration

Deletes old database backups automatically.

βœ… Best Practices: βœ” Configure S3 Expiration Policies to prevent unnecessary data storage. βœ” Use AWS Key Deletion for permanent data disposal. βœ” Implement IAM controls to restrict who can delete sensitive data.


πŸ”Ή Step 5: Continuous Monitoring & Auditing for Compliance

βœ” Why? – Ensures SecureCart meets compliance requirements and detects violations in real-time.

Monitoring Service

Purpose

Use Case in SecureCart

AWS CloudTrail

Tracks API access & changes.

Detects unauthorized attempts to modify data retention settings.

Amazon Macie

Scans for sensitive data exposure.

Identifies unencrypted credit card data in S3.

AWS Config

Checks compliance of storage settings.

Alerts if an S3 bucket is misconfigured for public access.

AWS Security Hub

Centralized compliance monitoring.

Tracks GDPR & PCI DSS violations.

βœ… Best Practices: βœ” Enable CloudTrail to track all API and data access actions. βœ” Use AWS Config to automatically enforce compliance rules. βœ” Monitor sensitive data with Amazon Macie.


πŸš€ Summary

βœ” Classify all data using Amazon Macie and enforce IAM-based controls. βœ” Apply retention policies using S3 Lifecycle, RDS backups, and DynamoDB TTL. βœ” Follow GDPR, PCI DSS, and HIPAA compliance requirements using AWS governance tools. βœ” Implement secure data deletion with KMS key expiration and object lifecycle policies. βœ” Monitor compliance with AWS CloudTrail, Security Hub, and Config Rules.

Scenario:

SecureCart’s security team must identify and classify sensitive data while enforcing data retention policies.

Key Learning Objectives:

βœ… Identify sensitive data using Amazon Macie βœ… Use AWS Config & Security Hub to monitor compliance βœ… Enforce data retention policies using IAM and lifecycle rules βœ… Align AWS technologies to meet compliance requirements

Hands-on Labs:

1️⃣ Enable Amazon Macie to Detect Sensitive Data in S3 2️⃣ Use AWS Config Rules to Enforce Data Governance Policies 3️⃣ Implement Data Retention Policies for Compliance

πŸ”Ή Outcome: SecureCart ensures data classification and compliance alignment.

PreviousData Encryption & Key ManagementNextData Backup, Replication & Recovery

Last updated 2 months ago