Security - Amazon Timestream


  • For continuous access to Timestream, ensure that encryption keys are secured and are not revoked or made inaccessible.

  • Monitor API access logs from Amazon CloudTrail. Audit and revoke any anomalous access pattern from unauthorized users.

  • Follow additional guidelines described in Security Best Practices for Amazon Timestream