AWS threat model
Visualize safeguarding user data through encryption and AWS services with this threat model example.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
about this example
This AWS threat model diagram provides a visual representation of securing sensitive user data. Here's what it illustrates:
- Data Flow Security: Demonstrates how user data, specifically phone numbers, is securely transmitted and stored within AWS.
- Encryption and Decryption: Highlights the use of AWS services for encryption in transit and at rest, ensuring data confidentiality.
- Role-Based Access: Indicates the use of AWS Management Console for controlled access to decrypted data.
- Secure Storage: Depicts how AWS Secrets Manager securely stores encryption keys separate from encrypted data in DynamoDB.
When to use
- Data Protection Planning: When planning security measures for sensitive user data within an AWS environment.
- Compliance Requirements: To ensure adherence to regulatory standards that mandate data encryption and secure key management.
- Security Auditing: While evaluating or improving existing security infrastructure to prevent unauthorized data access.
How to use
- Start editing: Duplicate the example file and begin customizing the diagram to align with your specific AWS security setup.
- Customize diagram: Modify the diagram elements to represent the actual services and data flows used in your environment.
- Customize layout: Rearrange the components for better clarity or to accommodate additional security layers.
- Collect feedback: Circulate the updated diagram among your security and DevOps teams for insights and validation.
Related Examples
View all examples
Use Eraser for all of your diagrams and docs
Beyond data flow diagrams, do you need to create other technical docs and diagrams like design docs, RFCs, network diagrams, and API diagrams? Eraser provides a single platform for modern engineering teams to collaborate on docs and diagrams.