sciencehistory / scihist_digicoll

Science History Institute Digital Collections
Other
12 stars 0 forks source link

Database backup encryption: document and look into any possible improvement #2462

Open eddierubeiz opened 10 months ago

eddierubeiz commented 10 months ago

Notes from @jrochkind , slightly edited:

"Look into the ways in which our backups are encrypted…. they aren’t currently I think except for the fact that they use default AWS S3 “at rest” encryption same as on every S3 bucket probably, which only guards against certain attacks (like someone who somehow had access to the AWS S3 physical media without going through usual AWS interfaces)

"We could use AWS client side encryption features to protect our DB backups specifically, and might want to, if we think they include sensitive patron data. https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingClientSideEncryption.html ?"

Look into the workflow that puts the backups into s3.

jrochkind commented 10 months ago

I would add that the only reason I am aware of that this matters is to the extnet that we may be storing confidential "patron" info in our DB.

MOST of our DB stuff is not especially sensitive or private. There may be other stuff that is I guess though -- non-public Oral History data? But this particular ticket does not apply to OH PDF and file assets, only to metadata. If we wanted to apply additional encryption to OH PDF etc assets, thats' a different ticket --currently we think putting on a private S3 bucket is sufficient.

jrochkind commented 10 months ago

and of course a risk of this kind of encryption is that if we could lose the encryption key or make some other mistake that makes our backups lost to us!