Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Lab
    • Libraries: If you want this lab, consider one of these libraries.
    • Cloud
    • Data
Google Cloud Platform icon
Labs

Securing Your Data in Amazon Redshift

This lab is designed to help you understand how to implement key security features in Amazon Redshift. You will learn how to enable encryption for data at rest using AWS Key Management Service (KMS), and ensure data in transit is protected using secure connection options. Additionally, you will configure audit logging to capture and analyze query logs, connection logs, and user activity logs for auditing and compliance purposes.

Google Cloud Platform icon
Lab platform
Lab Info
Level
Intermediate
Last updated
Sep 24, 2025
Duration
30m

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.
Table of Contents
  1. Challenge

    Applying Encryption and Audit Logging to Secure Amazon Redshift

    To start, you'll enable encryption and audit logging to enhance the security and compliance of your Amazon Redshift cluster. You'll create a custom parameter group, configure KMS encryption, and activate CloudWatch logging to monitor user activity and connections.

  2. Challenge

    Applying Security Groups and NACL Rules to Protect Redshift Clusters

    You’ll configure security groups and NACL rules to control and restrict network access to your Redshift cluster. These settings ensure only authorized resources, like your EC2 instance, can communicate with Redshift.

  3. Challenge

    Validating Encryption for Data At-Rest and In-Transit in Redshift

    You’ll verify that your Redshift cluster is encrypted both at rest and in transit. You’ll test connectivity with and without SSL to confirm that data transmission is securely enforced.

  4. Challenge

    Accessing Redshift Logs to Monitor User Activity

    Finally, you’ll access and monitor three types of Amazon Redshift logs in CloudWatch: Connection logs, which capture authentication attempts; User logs, which record user-level activities such as account changes; and User Activity logs, which detail SQL operations and queries. You’ll also query the stl_query system table in Redshift to retrieve historical information about executed queries for deeper visibility into workload behavior.

About the author

Pluralsight Skills gives leaders confidence they have the skills needed to execute technology strategy. Technology teams can benchmark expertise across roles, speed up release cycles and build reliable, secure products. By leveraging our expert content, skill assessments and one-of-a-kind analytics, keep up with the pace of change, put the right people on the right projects and boost productivity. It's the most effective path to developing tech skills at scale.

Real skill practice before real-world application

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Learn by doing

Engage hands-on with the tools and technologies you’re learning. You pick the skill, we provide the credentials and environment.

Follow your guide

All labs have detailed instructions and objectives, guiding you through the learning process and ensuring you understand every step.

Turn time into mastery

On average, you retain 75% more of your learning if you take time to practice. Hands-on labs set you up for success to make those skills stick.

Get started with Pluralsight