Examples of using Using server-side encryption in English and their translations into French
{-}
-
Colloquial
-
Official
Protecting Data Using Server-Side Encryption with Amazon S3-Managed Encryption Keys(SSE-S3.
For more information,see Protecting Data Using Server-Side Encryption.
See Protecting Data Using Server-Side Encryption with AWS KMS-Managed Keys SSE-KMS.
Example 2: Granting s3:PutObject permission requiring objects stored using server-side encryption.
For more information,see Protecting Data Using Server-Side Encryption with AWS KMS-Managed Keys SSE-KMS.
For more information about server-side encryption, see Protecting Data Using Server-Side Encryption.
The objects are encrypted using server-side encryption with either Amazon S3-managed keys(SSE-S3) or AWS KMS-managed keys SSE-KMS.
You can have objects in your source bucket that are created using server-side encryption using AWS KMS-managed keys.
Using server-side encryption with customer-provided encryption keys(SSE-C) allows you to set your own encryption keys.
For example, you might store data in Amazon S3 using server-side encryption with AWS KMS SSE-KMS.
For more information about Amazon S3 storage classes and encryption, see Storage Classes andProtecting Data Using Server-Side Encryption.
When retrieving objects that are stored encrypted using server-side encryption you will need to provide appropriate request headers.
For more information about server-side encryption and AWS KMS,see Protecting Data Using Server-Side Encryption and.
For more information,see Protecting Data Using Server-Side Encryption with Amazon S3-Managed Encryption Keys SSE-S3.
For more information about using SSE for Amazon SQS with AWS KMS,see Protecting Data Using Server-Side Encryption(SSE) and AWS KMS.
If you want the target object encrypted using server-side encryption with AWS-managed keys, you must provide the x-amz-server-side-encryption request header.
For more information about server-side encryption with AWS KMS,see Protecting Data Using Server-Side Encryption with AWS Key Management Service.
When using server-side encryption with customer-provided encryption keys(SSE-C), you must provide encryption key information using the following request headers.
For information about using AWS KMS,see Protecting Data Using Server-Side Encryption with AWS KMS-Managed Keys SSE-KMS.
If the copy source is an object that is stored in Amazon S3 using server-side encryption with customer provided key, you will need to provide encryption information in your request so Amazon S3 can decrypt the object for copying.
