Security Overview¶
Security is the foundation of Redshift Spectra. As an enterprise data access platform, we implement a defense-in-depth strategy that protects your data at every layer, from the network edge to the database row.
Zero-Trust Security Model¶
Redshift Spectra operates on a zero-trust principle: never trust, always verify. Every request is authenticated, authorized, and audited regardless of its origin.
flowchart TB
subgraph ZeroTrust["๐ Zero-Trust Security Layers"]
direction TB
subgraph Layer1["Layer 1: Network Security"]
WAF[AWS WAF<br/>DDoS Protection]
TLS[TLS 1.3<br/>Encryption in Transit]
end
subgraph Layer2["Layer 2: Identity & Access"]
AUTHN[Authentication<br/>JWT ยท API Key ยท IAM]
AUTHZ[Authorization<br/>Permission Checks]
end
subgraph Layer3["Layer 3: Request Validation"]
SQL[SQL Security<br/>Injection Prevention]
INPUT[Input Validation<br/>Schema Enforcement]
end
subgraph Layer4["Layer 4: Data Isolation"]
RLS[Row-Level Security<br/>Tenant Filtering]
RBAC[RBAC<br/>Column Access]
end
subgraph Layer5["Layer 5: Audit & Compliance"]
AUDIT[Audit Logging<br/>Complete Trail]
TRACE[Distributed Tracing<br/>Request Correlation]
end
end
Layer1 --> Layer2 --> Layer3 --> Layer4 --> Layer5
Security Design Principles¶
Principle 1: Database-Level Enforcement¶
Unlike traditional applications that enforce security in application code, Redshift Spectra delegates security enforcement to Amazon Redshift itself.
| Traditional Approach | Redshift Spectra |
|---|---|
| Security logic in application code | Security enforced by database engine |
| Developer must remember to add filters | Automatic filtering via RLS |
| Bugs can bypass security | Database guarantees isolation |
| Inconsistent enforcement | Uniform enforcement |
This architectural decision means that even if there's a bug in the application layer, tenant isolation cannot be violated.
Principle 2: Least Privilege¶
Every component operates with the minimum permissions required:
- Lambda functions have scoped IAM roles for specific operations
- Database users have restricted access to only their tenant's data
- API keys can be scoped to specific operations and tenants
- S3 access is limited to specific prefixes per tenant
Principle 3: Defense in Depth¶
Security is not a single control but multiple overlapping layers:
flowchart LR
REQUEST["๐ฅ Request"] --> WAF
subgraph Layers["Defense in Depth"]
WAF["๐ก๏ธ WAF<br/>Rate Limiting"] --> AUTH["๐ Authentication"]
AUTH --> PERM["โ
Authorization"]
PERM --> SQL["๐ SQL Validation"]
SQL --> RLS["๐ Row-Level Security"]
end
RLS --> DATA["๐ Data"]
style Layers fill:#e8f5e9,stroke:#4caf50
If one layer fails, others continue to protect your data.
Principle 4: Complete Auditability¶
Every operation is logged with sufficient detail for:
- Incident investigation โ Trace who accessed what data and when
- Compliance reporting โ Generate access reports for auditors
- Anomaly detection โ Identify unusual access patterns
- Forensics โ Reconstruct the full history of data access
Security Features Summary¶
| Feature | Purpose | Compliance Impact |
|---|---|---|
| TLS Encryption | Protect data in transit | SOC 2, PCI-DSS |
| JWT/API Key Auth | Identity verification | SOC 2, ISO 27001 |
| Row-Level Security | Tenant data isolation | GDPR, SOC 2 |
| SQL Injection Prevention | Query safety | OWASP Top 10 |
| Audit Logging | Complete access trail | All frameworks |
| Rate Limiting | Abuse prevention | Availability |
| Secret Rotation | Credential hygiene | SOC 2, PCI-DSS |
Threat Model¶
Redshift Spectra is designed to protect against these threat categories:
External Threats¶
- DDoS attacks โ Mitigated by AWS WAF and API Gateway throttling
- SQL injection โ Blocked by multi-layer SQL validation
- Credential stuffing โ Prevented by rate limiting and token validation
- Man-in-the-middle โ Prevented by TLS 1.3 encryption
Insider Threats¶
- Cross-tenant access โ Prevented by database-level RLS
- Unauthorized queries โ Blocked by SQL whitelist validation
- Data exfiltration โ Controlled by result size limits and audit logging
Application Vulnerabilities¶
- Code bugs โ Cannot bypass database-level security
- Misconfiguration โ Default-secure settings
- Dependency vulnerabilities โ Regular security updates
Compliance Considerations¶
Redshift Spectra supports compliance with major frameworks:
flowchart TB
subgraph Frameworks["Compliance Frameworks"]
SOC2[SOC 2 Type II]
GDPR[GDPR]
HIPAA[HIPAA]
PCI[PCI-DSS]
ISO[ISO 27001]
end
subgraph Controls["Redshift Spectra Controls"]
C1[Data Isolation]
C2[Encryption]
C3[Access Logging]
C4[Identity Management]
C5[Data Minimization]
end
C1 --> SOC2
C1 --> GDPR
C1 --> HIPAA
C2 --> SOC2
C2 --> PCI
C2 --> HIPAA
C3 --> SOC2
C3 --> GDPR
C3 --> ISO
C4 --> SOC2
C4 --> ISO
C5 --> GDPR
Shared Responsibility
Redshift Spectra provides security controls, but compliance is a shared responsibility. You must:
- Configure tenant mappings correctly
- Implement Row-Level Security policies in Redshift
- Manage API key lifecycle
- Monitor audit logs
Next Steps¶
Dive deeper into specific security topics:
- Authentication โ How identity is verified
- Authorization โ How permissions are enforced
- SQL Security โ How queries are validated