AWS Certified Solutions Architect - Associate (SAA-C02)

Sign Up Free or Log In to participate!

Why wouldn’t you turn on server-side encryption for an S3 bucket? What are the downsides to SSE?

If it is so easy to turn on SSE with just SSE-S3, why not do it all the time?  Are there latency concerns for read/write?  Any other downsides?

tinti

This is not the answer but it is nice to think about: https://security.stackexchange.com/questions/8765/what-does-amazons-s3-server-side-encryption-protect-against

Paul Kater

There is no ‘downside’ for SSE, and yes, always encrypt your stuff. That should be an automated reaction. The reason there’s also client-side encryption is that some companies are on security level "paranoid" and want to or have to be in total control of the whole process. SSE is easier and safe, but sometimes there are company rules or even legal rules for DIY encryption.

3 Answers

the default answer is "always encrypt everything"…:-). There are no performance downsides to using AWS service-based encryption.  When using AWS-managed encryption it’s just a setting and you never reference it again.  Encryption can get complex when using KMS and customer-managed keys.  Overall it’s best practice to encrypt everything at rest and in transit.

While you are on the right train of thought, I think the only main reason you might want to turn it off is because you plan to manage encryption yourself using alternative methods which AWS managed encryption may interfere with. 

It does bring about an interesting question though. If this is the main kind of use case where a customer would possibly not want encryption enabled, why isn’t it enabled by default? AWS does a fantastic job with default firewall rules via bucket policy’s and ACL’s, why do they seem to stop short when it comes to encryption sensitive data?

There are a couple ways to think about this.  To directly answer your question, there really isn’t a DOWNSIDE to encrypting.  As you dive further into your AWS studies, you will find there are certain KMS metrics/limits you have to be aware of… as well as really know why you or your organization should use one type of encryption over another.  You should know what happens when you encrypt your objects with SSE-S3 and then make your bucket public (hint in case you didn’t know, everyone will still have access due to the type of encryption and public access).

With that said, in my opinion, you should architect based on least privilege access, best practices for the architecture you’re deploying, and WHAT YOU NEED.  If you have a bunch of images you do not care about (IE not sensitive content), why would you encrypt them?  It does not makes sense to add encryption (whether they become public or not) in this case.   If you have data files (let’s say sensitive database backups in a .gz format) in S3, you probably want to ensure they are encrypted with the right type of encryption that meets your needs (and you probably do not want SSE-S3 encryption).  There are many more examples of this. Best practices in 1 case does not equal best practices in every other case.  I hope this helps.

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?