Data Encryption Options - Amazon Elastic Transcoder

End of support notice: On November 13, 2025, AWS will discontinue support for Amazon Elastic Transcoder. After November 13, 2025, you will no longer be able to access the Elastic Transcoder console or Elastic Transcoder resources.

For more information about transitioning to AWS Elemental MediaConvert, visit this blog post.

Data Encryption Options

You can protect your Elastic Transcoder data by encrypting any input and output files that you want to use for a transcoding job while the files are stored, or at rest, in Amazon S3. This includes the input file, the output file, and any thumbnails, captions, input watermarks, or input album art. Playlists and metadata are not encrypted.

All resources for a job — including the pipeline, Amazon S3 buckets, and AWS Key Management Service key — should be in the same AWS region.

Encryption Options

Elastic Transcoder supports two main encryption options:

  • Amazon S3 Server-Side Encryption: AWS manages the encryption process for you. For example, Elastic Transcoder calls Amazon S3, and Amazon S3 encrypts your data, saves it on disks in data centers, and decrypts the data when you download it.

    By default, Amazon S3 buckets accept both encrypted and unencrypted files, but you can set up your Amazon S3 bucket to accept only encrypted files. You don’t need to make permission changes as long as Elastic Transcoder has access to your Amazon S3 bucket.

    For more information about Amazon S3 server-side encryption, see Protecting Data Using Server-Side Encryption in the Amazon Simple Storage Service User Guide. For more information about AWS KMS keys, see What is the AWS Key Management Service? in the AWS Key Management Service Developer Guide.

    Note

    There are additional charges for using AWS-KMS keys. For more information, see AWS Key Management Service Pricing.

  • Client-Side Encryption Using Customer-Provided Keys: Elastic Transcoder can also use a client-provided encryption key to decrypt input files (which you’ve already encrypted yourself) or encrypt your output files before storing them in Amazon S3. In this case, you manage the encryption keys and related tools.

    If you want Elastic Transcoder to transcode a file using client-provided keys, your job request must include the AWS KMS-encrypted key that you used to encrypt the file, the MD5 of the key that will be used as a checksum, and the initialization vector (or series of random bits created by a random bit generator) that you want Elastic Transcoder to use when encrypting your output files.

    Elastic Transcoder can only use customer-provided keys that are encrypted with an AWS KMS KMS key, and Elastic Transcoder must be given permissions to use the KMS key. To encrypt your key, you must call AWS KMS programmatically with an encryption call that contains the following information:

    { "EncryptionContext": { "service" : "elastictranscoder.amazonaws.com" }, "KeyId": "The ARN of the key associated with your pipeline", "Plaintext": blob that is your AES key }
    Important

    Your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to decrypt your data.

    To give Elastic Transcoder permission to use your key, see Using AWS KMS with Elastic Transcoder.

    For more information on encrypting data, see the AWS KMS API Reference and Encrypting and Decrypting Data. For more information on contexts, see Encryption Context in the AWS Key Management Service Developer Guide.

    For more information about client-provided keys, see Protecting Data Using Server-Side Encryption with Customer-Provided Encryption Keys in the Amazon Simple Storage Service User Guide.

For information about the settings required when decrypting and encrypting files using the Elastic Transcoder console, see (Optional) Output Encryption. For information about the settings required when decrypting and encrypting files using the Elastic Transcoder API, see the Create Job API action beginning with the Encryption element.

Using AWS KMS with Elastic Transcoder

You can use the AWS Key Management Service (AWS KMS) with Elastic Transcoder to create and manage the encryption keys that are used to encrypt your data. Before you can set up Elastic Transcoder to use AWS KMS, you must have the following:

  • Elastic Transcoder pipeline

  • IAM role associated with the Elastic Transcoder pipeline

  • AWS KMS key

  • ARN of the AWS KMS key

The following procedures show how to identify your existing resources or create new ones.

Getting Ready to Use AWS KMS with Elastic Transcoder

To create a pipeline
To identify the IAM role associated with your pipeline
  1. Sign in to the AWS Management Console and open the Elastic Transcoder console at https://console.aws.amazon.com/elastictranscoder/.

  2. In the navigation pane, click Pipelines.

  3. Click the magnifying glass icon next to the pipeline name.

  4. Click the Permissions section to expand it.

  5. Take note of the IAM role. If you are using the default role created by Elastic Transcoder, the role is Elastic_Transcoder_Default_Role.

To create an AWS KMS key
  1. Open the IAM console at https://console.aws.amazon.com/iam/.

  2. Follow the steps in Creating Keys.

To identify the ARN of an AWS KMS key
  1. Open the IAM console at https://console.aws.amazon.com/iam/.

  2. In the navigation pane, click Encryption Keys.

  3. In the region drop-down list, select the region that your key and pipeline are in.

  4. Click the key you want to use.

  5. Take note of the ARN.

You can use the console to create an AWS KMS key, but you must use the encryption and decryption APIs to encrypt or decrypt data with an AWS KMS key. For more information, see Encrypting and Decrypting Data.

Connecting Elastic Transcoder and AWS KMS

Once you have your pipeline, IAM role, and AWS KMS key, you must tell the pipeline which key to use, and tell the key which IAM role can use it.

To add the AWS KMS key to your pipeline

  1. Open the Elastic Transcoder console at https://console.aws.amazon.com/elastictranscoder/.

  2. Select the pipeline that you want to use the AWS KMS key with, and click Edit.

  3. Click the Encryption section to expand it, and in the AWS KMS Key ARN section, select Custom.

  4. Type in the ARN of your AWS KMS key, and click Save.

To add an IAM role to your AWS KMS key

If you did not create your AWS KMS key with the IAM role associated with your pipeline, you can add it by following this procedure:

  1. Open the AWS KMS console at https://console.aws.amazon.com/kms.

  2. In the Region drop-down list, select the Region that you chose when you created your key and your pipeline.

  3. In the navigation pane, choose Customer managed keys.

  4. In the Customer managed keys section on the right, choose the name of the key that you want to use.

  5. In the Key users section, choose Add.

  6. On the Add key users page, search for the role associated with your pipeline, select it from the results, and choose Add.

You can now use your AWS KMS key with your Elastic Transcoder pipeline.