Menu
Cost Optimization: EC2 Right Sizing
Cost Optimization: EC2 Right Sizing

Security

The AWS Cloud provides a scalable, highly reliable platform that helps customers deploy applications and data quickly and securely. When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS. This shared model can reduce your operational burden as AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate. In turn, you assume responsibility and management of the guest operating system (including updates and security patches), other associated applications, as well as the configuration of the AWS-provided security group firewall. For more information about security on AWS, visit the AWS Security Center.

Security Groups

The security groups created in this solution are designed to control and isolate network traffic between the EC2 instance and Amazon Redshift. We recommend that you review the security groups and further restrict access as needed once the deployment is up and running.

Additional Security Settings

The Redshift cluster requires that the user provide a username and password pair to provide control over access to the Amazon Redshift cluster.