Featured resource
Forrester Wave Report 2025
Pluralsight named a Leader in the Forrester Wave™

Our tech skill development platform earned the highest scores possible across 11 criteria.

Learn more
  • Labs icon Lab
  • Cloud
  • Data
Google Cloud Platform icon
Labs

Securing Your Data in Amazon Redshift

This lab is designed to help you understand how to implement key security features in Amazon Redshift. You will learn how to enable encryption for data at rest using AWS Key Management Service (KMS), and ensure data in transit is protected using secure connection options. Additionally, you will configure audit logging to capture and analyze query logs, connection logs, and user activity logs for auditing and compliance purposes.

Google Cloud Platform icon
Labs

Path Info

Level
Clock icon Intermediate
Duration
Clock icon 30m
Published
Clock icon May 20, 2025

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Applying Encryption and Audit Logging to Secure Amazon Redshift

    To start, you'll enable encryption and audit logging to enhance the security and compliance of your Amazon Redshift cluster. You'll create a custom parameter group, configure KMS encryption, and activate CloudWatch logging to monitor user activity and connections.

  2. Challenge

    Applying Security Groups and NACL Rules to Protect Redshift Clusters

    You’ll configure security groups and NACL rules to control and restrict network access to your Redshift cluster. These settings ensure only authorized resources, like your EC2 instance, can communicate with Redshift.

  3. Challenge

    Validating Encryption for Data At-Rest and In-Transit in Redshift

    You’ll verify that your Redshift cluster is encrypted both at rest and in transit. You’ll test connectivity with and without SSL to confirm that data transmission is securely enforced.

  4. Challenge

    Accessing Redshift Logs to Monitor User Activity

    Finally, you’ll access and monitor three types of Amazon Redshift logs in CloudWatch: Connection logs, which capture authentication attempts; User logs, which record user-level activities such as account changes; and User Activity logs, which detail SQL operations and queries. You’ll also query the stl_query system table in Redshift to retrieve historical information about executed queries for deeper visibility into workload behavior.

Pluralsight Skills gives leaders confidence they have the skills needed to execute technology strategy. Technology teams can benchmark expertise across roles, speed up release cycles and build reliable, secure products. By leveraging our expert content, skill assessments and one-of-a-kind analytics, keep up with the pace of change, put the right people on the right projects and boost productivity. It's the most effective path to developing tech skills at scale.

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.