Data protection in AWS Outposts
The AWS shared responsibility model
For data protection purposes, we recommend that you protect AWS account credentials and set up individual users with AWS IAM Identity Center or AWS Identity and Access Management (IAM). That way, each user is given only the permissions necessary to fulfill their job duties.
For more information about data privacy, see the Data Privacy FAQ
Encryption at rest
With AWS Outposts, all data is encrypted at rest. The key material is wrapped to an external key stored in a removable device, the Nitro Security Key (NSK). The NSK is required to decrypt the data on your Outposts rack.
You can use Amazon EBS encryption for your EBS volumes and snapshots. Amazon EBS encryption uses AWS Key Management Service (AWS KMS) and KMS keys. For more information, see Amazon EBS Encryption in the Amazon EC2 User Guide.
Encryption in transit
AWS encrypts in-transit data between your Outpost and its AWS Region. For more information, see Connectivity through service link.
You can use an encryption protocol, such as Transport Layer Security (TLS), to encrypt sensitive data in transit through the local gateway to your local network.
Data deletion
When you stop or terminate an EC2 instance, the memory allocated to it is scrubbed (set to zero) by the hypervisor before it is allocated to a new instance, and every block of storage is reset.
Destroying the Nitro Security Key cryptographically shreds the data on your Outpost.