Guidance on securing Amazon RDS infrastructure, covering shared responsibility, network isolation, encryption, authentication, backups, monitoring, and operational best practices.
Welcome back. In this lesson we cover infrastructure security for Amazon RDS and the security responsibilities you retain when using a managed database service.Using a managed service like Amazon RDS gives you a major advantage: AWS operates and secures the underlying global infrastructure (physical datacenters, hardware, hypervisor, and core network). That removes much of the operational burden compared to an on‑premises deployment. However, you still retain important responsibilities for configuration, access, and data protection inside your AWS account.
AWS secures the cloud infrastructure; you secure the resources and configuration inside your account. Knowing which controls AWS manages and which are your responsibility is essential for a secure RDS deployment.
AWS is responsible for the security “of” the cloud: physical facilities, host infrastructure, virtualization, and managed service runtimes.
You are responsible for security “in” the cloud: network configuration, access control, encryption keys (when customer‑managed), database users and credentials, and the data stored in RDS.
Responsibility
AWS (Security of the cloud)
You (Security in the cloud)
Physical security & datacenters
✔️
Hypervisor & managed runtime
✔️
OS patching for managed engines
✔️ (major responsibility)
Keep parameter groups/engine versions current
Network configuration (VPC, subnets)
✔️
Security groups & NACLs
✔️
IAM, roles, and user policies
✔️
Data encryption keys
Shared: AWS-managed CMKs by default; customer-managed possible
Choose CMK type and manage policies/rotation if customer-managed
Enable encryption at rest using AWS KMS. Decide between AWS-managed CMKs or customer-managed CMKs. Customer CMKs provide more control (key policies, rotation, access restrictions).
Enforce TLS for in-transit encryption. Configure your database clients to validate certificates and require TLS.
When using customer-managed CMKs, create strict IAM policies and key policies to limit who can use or manage the keys.