Menu
Data Lake Solution
Data Lake Solution

Security

The AWS Cloud provides a scalable, highly reliable platform that helps customers deploy applications and data quickly and securely. When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS, which can reduce your operational burden. For more information about security on AWS, visit the AWS Security Center.

User Authorization

Authorized users access the data lake using the solution-generated console, the data lake CLI, or direct calls to the data lake APIs. Users log in to the data lake console with their user name (by default, their email) and password. Authentication to the console is managed in an Amazon Cognito user pool.

Requests to the data lake API are HTTPS based and must be signed with an access key (access key and secret access key combination) to confirm the user’s identity. Administrators can grant API access on an individual user basis. If a user is granted API access, an access key is generated to identify that user’s calls to the data lake API. Each user has the ability to generate their own secret access keys to allow them to work with the data lake CLI or make direct API calls.

See Appendix A for additional component-level security information.

On this page: