Thursday, April 24, 2025
HomeCyber Security NewsAmazon Introduces Redshift Security Features to Prevent Data Leaks

Amazon Introduces Redshift Security Features to Prevent Data Leaks

Published on

SIEM as a Service

Follow Us on Google News

Amazon Web Services (AWS) has announced significant updates to its popular data warehousing service, Amazon Redshift, with the introduction of enhanced security features aimed at minimizing data leaks and unauthorized access.

These new default settings strengthen the security posture of newly created Redshift clusters and align with industry best practices for safeguarding sensitive data.

The updates encompass three major changes: disabling public accessibility, enabling database encryption by default, and enforcing secure connections.

- Advertisement - Google News

These security enhancements apply to newly provisioned Amazon Redshift clusters, Serverless workgroups, and clusters restored from snapshots, offering customers a more secure and simplified setup process.

Key Updates to Amazon Redshift Security

Disabling Public Accessibility:

Redshift clusters will now be private by default, accessible only within a customer’s Virtual Private Cloud (VPC).

This change limits exposure to the public internet, reducing the risk of unauthorized access. Customers requiring public access must explicitly override the default setting by configuring the PubliclyAccessible parameter during cluster creation.

AWS recommends using security groups or network access control lists (ACLs) to further control access when enabling public accessibility.

Enabling Database Encryption by Default:

All new Redshift clusters will automatically use encryption. Those created without specifying a Key Management Service (KMS) key will default to encryption using an AWS-managed key.

With this change, unencrypted clusters are no longer permitted via the AWS Management Console.

Existing workflows relying on unencrypted clusters, such as certain data-sharing configurations, will require adjustments to ensure compatibility with the new encryption requirement.

Enforcing Secure Connections (SSL):

Secure communication between applications and Redshift clusters is now enforced by default with the introduction of a new parameter group, default.redshift-2.0.

This group automatically sets the require_ssl parameter to true, ensuring that all data exchanged between applications and the database is encrypted to prevent eavesdropping and man-in-the-middle attacks.

While existing custom parameter groups remain unaffected, AWS encourages customers to update their configurations to adopt SSL across all Redshift connections.

These security enhancements are designed to reduce human error and eliminate common misconfigurations, offering customers a more secure out-of-the-box experience.

AWS has advised organizations to review their existing Redshift configurations, scripts, and workflows to align with the new defaults and avoid disruptions.

Amazon Redshift’s new security features underscore AWS’s commitment to protecting customer data while delivering scalable and user-friendly cloud solutions.

For businesses relying on Redshift for data warehousing, these updates mark a crucial step toward better cybersecurity and regulatory compliance.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in...

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in...

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...