Skip to content

Security Overview

Security is the foundation of Redshift Spectra. As an enterprise data access platform, we implement a defense-in-depth strategy that protects your data at every layer, from the network edge to the database row.

Zero-Trust Security Model

Redshift Spectra operates on a zero-trust principle: never trust, always verify. Every request is authenticated, authorized, and audited regardless of its origin.

flowchart TB
    subgraph ZeroTrust["๐Ÿ” Zero-Trust Security Layers"]
        direction TB

        subgraph Layer1["Layer 1: Network Security"]
            WAF[AWS WAF<br/>DDoS Protection]
            TLS[TLS 1.3<br/>Encryption in Transit]
        end

        subgraph Layer2["Layer 2: Identity & Access"]
            AUTHN[Authentication<br/>JWT ยท API Key ยท IAM]
            AUTHZ[Authorization<br/>Permission Checks]
        end

        subgraph Layer3["Layer 3: Request Validation"]
            SQL[SQL Security<br/>Injection Prevention]
            INPUT[Input Validation<br/>Schema Enforcement]
        end

        subgraph Layer4["Layer 4: Data Isolation"]
            RLS[Row-Level Security<br/>Tenant Filtering]
            RBAC[RBAC<br/>Column Access]
        end

        subgraph Layer5["Layer 5: Audit & Compliance"]
            AUDIT[Audit Logging<br/>Complete Trail]
            TRACE[Distributed Tracing<br/>Request Correlation]
        end
    end

    Layer1 --> Layer2 --> Layer3 --> Layer4 --> Layer5

Security Design Principles

Principle 1: Database-Level Enforcement

Unlike traditional applications that enforce security in application code, Redshift Spectra delegates security enforcement to Amazon Redshift itself.

Traditional Approach Redshift Spectra
Security logic in application code Security enforced by database engine
Developer must remember to add filters Automatic filtering via RLS
Bugs can bypass security Database guarantees isolation
Inconsistent enforcement Uniform enforcement

This architectural decision means that even if there's a bug in the application layer, tenant isolation cannot be violated.

Principle 2: Least Privilege

Every component operates with the minimum permissions required:

  • Lambda functions have scoped IAM roles for specific operations
  • Database users have restricted access to only their tenant's data
  • API keys can be scoped to specific operations and tenants
  • S3 access is limited to specific prefixes per tenant

Principle 3: Defense in Depth

Security is not a single control but multiple overlapping layers:

flowchart LR
    REQUEST["๐Ÿ“ฅ Request"] --> WAF

    subgraph Layers["Defense in Depth"]
        WAF["๐Ÿ›ก๏ธ WAF<br/>Rate Limiting"] --> AUTH["๐Ÿ”‘ Authentication"]
        AUTH --> PERM["โœ… Authorization"]
        PERM --> SQL["๐Ÿ” SQL Validation"]
        SQL --> RLS["๐Ÿ”’ Row-Level Security"]
    end

    RLS --> DATA["๐Ÿ“Š Data"]

    style Layers fill:#e8f5e9,stroke:#4caf50

If one layer fails, others continue to protect your data.

Principle 4: Complete Auditability

Every operation is logged with sufficient detail for:

  • Incident investigation โ€” Trace who accessed what data and when
  • Compliance reporting โ€” Generate access reports for auditors
  • Anomaly detection โ€” Identify unusual access patterns
  • Forensics โ€” Reconstruct the full history of data access

Security Features Summary

Feature Purpose Compliance Impact
TLS Encryption Protect data in transit SOC 2, PCI-DSS
JWT/API Key Auth Identity verification SOC 2, ISO 27001
Row-Level Security Tenant data isolation GDPR, SOC 2
SQL Injection Prevention Query safety OWASP Top 10
Audit Logging Complete access trail All frameworks
Rate Limiting Abuse prevention Availability
Secret Rotation Credential hygiene SOC 2, PCI-DSS

Threat Model

Redshift Spectra is designed to protect against these threat categories:

External Threats

  • DDoS attacks โ€” Mitigated by AWS WAF and API Gateway throttling
  • SQL injection โ€” Blocked by multi-layer SQL validation
  • Credential stuffing โ€” Prevented by rate limiting and token validation
  • Man-in-the-middle โ€” Prevented by TLS 1.3 encryption

Insider Threats

  • Cross-tenant access โ€” Prevented by database-level RLS
  • Unauthorized queries โ€” Blocked by SQL whitelist validation
  • Data exfiltration โ€” Controlled by result size limits and audit logging

Application Vulnerabilities

  • Code bugs โ€” Cannot bypass database-level security
  • Misconfiguration โ€” Default-secure settings
  • Dependency vulnerabilities โ€” Regular security updates

Compliance Considerations

Redshift Spectra supports compliance with major frameworks:

flowchart TB
    subgraph Frameworks["Compliance Frameworks"]
        SOC2[SOC 2 Type II]
        GDPR[GDPR]
        HIPAA[HIPAA]
        PCI[PCI-DSS]
        ISO[ISO 27001]
    end

    subgraph Controls["Redshift Spectra Controls"]
        C1[Data Isolation]
        C2[Encryption]
        C3[Access Logging]
        C4[Identity Management]
        C5[Data Minimization]
    end

    C1 --> SOC2
    C1 --> GDPR
    C1 --> HIPAA
    C2 --> SOC2
    C2 --> PCI
    C2 --> HIPAA
    C3 --> SOC2
    C3 --> GDPR
    C3 --> ISO
    C4 --> SOC2
    C4 --> ISO
    C5 --> GDPR

Shared Responsibility

Redshift Spectra provides security controls, but compliance is a shared responsibility. You must:

  • Configure tenant mappings correctly
  • Implement Row-Level Security policies in Redshift
  • Manage API key lifecycle
  • Monitor audit logs

Next Steps

Dive deeper into specific security topics: