Hinson's blog

π•°π–π–ˆπ–Šπ–‘π–‘π–Šπ–“π–ˆπ–Š π–Žπ–“ π–ˆπ–‘π–”π–šπ–‰ π–†π–—π–ˆπ–π–Žπ–™π–Šπ–ˆπ–™π–šπ–—π–Š 𝖆𝖓𝖉 π–˜π–Šπ–ˆπ–šπ–—π–Žπ–™π–ž π–‰π–”π–’π–†π–Žπ–“π–˜ π–Žπ–˜ π–™π–π–Š π–Šπ–™π–Šπ–—π–“π–†π–‘ π–•π–šπ–—π–˜π–šπ–Žπ–™ 𝖔𝖋 π–’π–ž π–•π–—π–”π–‹π–Šπ–˜π–˜π–Žπ–”π–“π–†π–‘ π–Œπ–—π–”π–œπ–™π–

SAA-C03 CERTIFICATION NOTE – DAY 04

Spread the love

  • Scalability and Near-Real-Time Processing: Amazon Kinesis Data Streams can handle large volumes of data in real-time, making it an ideal choice for handling millions of financial transactions. It’s built to scale automatically according to the load, which suits the requirement of serving hundreds of thousands of users during peak hours.
  • Removing Sensitive Data: The integration of AWS Lambda with Kinesis Data Streams allows for the processing of each transaction to remove sensitive data before storage. Lambda can execute the necessary logic to ensure that the data conforms to privacy standards before it is persisted.
  • Storing Processed Data for Low-Latency Retrieval: Amazon DynamoDB is a fast and flexible NoSQL database service for any scale. Storing the processed transactions in DynamoDB would allow for low-latency retrieval by other internal applications, which is crucial for an online marketplace web application that serves a large number of users.
  • Data Sharing with Other Applications: Other applications can consume the processed transactions directly from Kinesis Data Streams if they need near-real-time data, or they can access the data stored in DynamoDB if they need processed and persisted data. This setup provides flexibility depending on the requirements of the consuming applications.



The Amazon S3 Encryption Client supportsΒ client-side encryption, where you encrypt your objects before you send them to Amazon S3. Amazon S3 provides server-side encryption options that encrypt your objects at their destination before they are saved in Amazon S3.
https://docs.aws.amazon.com/amazon-s3-encryption-client/latest/developerguide/client-server-side.html


  1. Choose an Encryption Client: Decide whether you will use the AWS SDK provided client-side encryption library. AWS SDKs offer encryption clients that automate the encryption and decryption processes.
  2. Set Up AWS KMS or Use a Custom Encryption Key:
    • If you’re using AWS Key Management Service (AWS KMS) for key management, you need to create a KMS key and have the necessary permissions to use it.
    • Alternatively, you can manage your own encryption keys.
  3. Encrypt Data Before Uploading to S3:
    • Use the encryption client to encrypt your data before uploading it to S3. The client will use your specified KMS key or your own custom key for encryption.
    • The encryption process converts your original data into ciphertext, which is what gets stored in S3.
  4. Upload Encrypted Data to S3:
    • Once encrypted, upload the data to your S3 bucket like you would with any other object. The key difference is that the data is now encrypted.
  5. Decrypt Data After Downloading from S3:
    • When you download the encrypted data from S3, use the same encryption client to decrypt the data. The client will automatically handle the decryption process, using the appropriate key.

Leave a Reply

Your email address will not be published. Required fields are marked *