6.3. Confidential Data, Secrets, and Key Materials
Think of secrets — database credentials, API keys, certificates, encryption key material — like master keys to a building. A compromised encryption key decrypts everything it protects; a leaked database credential exposes every record. A compromised encryption key decrypts everything it protects; a leaked database credential exposes every record. Unlike other data, secrets have a dual nature: they both protect other data AND are data themselves that need protection. Think of it like the key to the key cabinet: losing it doesn't just compromise one lock — it compromises every lock the cabinet key opens. Without proper secret management, organizations embed credentials in source code, share encryption keys via email, and never rotate passwords — creating a web of vulnerabilities that a single breach can unravel entirely. What makes the SCS-C03's treatment of secrets different from previous versions? The new exam adds specific skills around imported key material, sensitive data masking, and multi-Region key management.
This section covers secret lifecycle management, the distinction between imported and AWS-generated keys, data masking mechanisms, and managing cryptographic materials across Regions.
Scenario: A developer hardcodes a database password in a Lambda environment variable. The password is visible in the Lambda console, stored in plaintext in CloudFormation templates, and never rotated.
Reflection Question: Why does the exam consider hardcoded credentials a critical security failure, and how does Secrets Manager fundamentally change the credential lifecycle?