To avoid Post-Quantum problems itself, VPC Encryption uses symmetric keys that are shared between senders. They are frequently rotated and revoked to provide forward secrecy.
-
-
Of course it's great too to have a built-in mechanism to protect legacy traffic that is not encrypted at all.
Show this thread -
These are first features I've ever worked on where is no API, nothing for you to do. This is all under the hood. There is no change to your experience running on AWS. Customers never see the encrypted traffic, we do the encryption and decryption for you.
Show this thread -
All of the encryption and decryption happens in hardware; and for VPC Encryption, it's custom silicon designed and built by Annapurna labs as part of our Nitro security system. That means we can all of this with no impact on performance. We've been in production for months!
Show this thread -
O.k. there you have it. VPC Encryption, Lever Link Encryption, Multi-Party key distribution, AES-256, no API or settings, just "on". AMA.
Show this thread
End of conversation
New conversation -
-
-
Great overview! Generally very happy on how much aws secures if used correctly. Now if people stop using public subnets, talking to all other instances over public ips, that would be great

Great work!Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.