Every AWS resource has an AWS account and authorization to develop and access the resources managed by permissions strategies. Moreover, an account executive can connect approval strategies to IAM identities, including groups, users, and even roles. Several services such as AWS Lambda further enable assigning permissions strategies to resources.

However, the person decides against who is going to get the permissions, for which resources they get approvals and the particular proceeds that he permits on those resources. 

Introduction to Redshift 

Redshift is the most commonly used warehouse solution throughout the world. About 10 thousand international companies are currently using this popular cloud data store. It is provided by AWS and based on modified PostgreSQL. The access control of Redshift has three major fields that also include redshift permissions.

  1. Cluster management
  2. Cluster connectivity
  3. Database access

Cluster management

Cluster management is the faculty to produce, compose and remove the foundation itself. These kinds of activities are under the control of AWS security credentials. The IAM users from the console or by API performed these operations.

Cluster connectivity

Cluster connectivity indicates the network access control, and it comes on the basis of CIDR (Classless Inter-Domain Routing) security units 

Database access

Database access is applied following a fixable and securable object including table, column, database, or view. Commands of SQL GRANT & CREATE configure this. Moreover, users can further get temporary access through particular connection strings utilizing AWS IAM users. 

However, you can make use of IAM identity providers rather than making IAM users in your AWS accounts in case you already control user identities outside of AWS. 

Here in this guide, you will find the following, 

  • In AWS Redshift, network access control
  • Monitoring and Privilege violation logging in AWS Redshift
  • Handling Redshift access users, groups, and roles
  • Access logging and monitoring in AWS Redshift
  • For federation, identity management integration.
  • Fine-grained Redshit access control

In AWS Redshift, network access control

The network infrastructure configuration in your AWS account controls the network access control n AWS Redshift. This is the place you can address restrictions inside your VPC, cluster connectivity, or you can also choose whether it opens via a VPN or publicly. 

Moreover, the configuration settings of Redshift’s network are pretty much the same as the access configuration of additional AWS resources. They are not going to be covered in this thorough guide. 

It should be noted that you are setting up your connectivity to the whole cluster at the time of setting up network access on Redshift. With this, you will further get limited options for more granular control. And this will stop you from gaining access to particular securable objects, including tables, databases, rows, columns, and views or just providing specific IP addresses access to some confidential data. 

Amazon Redshift functions and resources

A cluster is a significant resource in Amazon Redshift. Amazon Redshift is also supporting additional resources. These other resources can be utilized with substantial resources, including event subscriptions, parameter groups, and snapshots. Furthermore, these are called subresources. 

How long does AWS Redshift retain access logs?

AWS declares that the conservation period is just about two to five days when using system tables (though in a test cluster, we have also seen long records up to seven days). This brief period is valuable for troubleshooting. While not for tracing behavior for an extended period or implementing response for incidents expired out of the prescribed period.