Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

3.4.2.3. Data Management (Classification, Encryption, Key Management, Access Controls)

3.4.2.3. Data Management (Classification, Encryption, Key Management, Tokenization)

Data security follows the lifecycle: classify → encrypt → manage keys → control access → audit.

Data classification with Amazon Macie:
  • ML-powered service that discovers PII, financial data, credentials in S3 buckets
  • Automated discovery scans all buckets; targeted scans focus on specific prefixes
  • Findings: "S3 bucket contains 1,247 objects with credit card numbers"
Encryption strategies:
ApproachWhere EncryptedKey ManagementUse Case
SSE-S3Server-side (S3 managed)AWS manages everythingDefault S3 encryption
SSE-KMSServer-side (KMS managed)You control key policyAudit trail, key rotation
SSE-CServer-side (customer key)You provide key per requestRegulatory requirement
Client-sideBefore uploadYou manage entirelyMaximum control
AWS KMS key types:
  • AWS managed keys (aws/s3, aws/ebs): Free, automatic rotation, limited control
  • Customer managed keys (CMKs): You control policy, rotation, and access. $1/month/key.
  • Customer managed keys with imported material: You generate and import the key material

Tokenization replaces sensitive data with a non-sensitive token. AWS doesn't have a native tokenization service — implement with DynamoDB (token → data mapping) or use third-party solutions.

Exam Trap: SSE-KMS has a request rate limit (5,500-30,000 requests/second depending on region). High-throughput S3 workloads can be throttled by KMS. If the exam describes S3 performance degradation with KMS encryption, the answer is either using S3 bucket keys (reduces KMS calls by 99%) or switching to SSE-S3.

Alvin Varughese
Written byAlvin Varughese•Founder•15 professional certifications