Infrastructure Security in Amazon S3 Glacier
As a managed service, Amazon S3 Glacier (S3 Glacier) is protected by the Amazon global network security
procedures that are described in the Amazon
Web Services: Overview of Security Processes
Access to S3 Glacier via the network is through Amazon published APIs. Clients must support Transport Layer Security (TLS) 1.2. We recommend TLS 1.3 or later. Clients must also support cipher suites with Perfect Forward Secrecy (PFS) such as Ephemeral Diffie-Hellman (DHE) or Elliptic Curve Diffie-Hellman Ephemeral (ECDHE). Most modern systems such as Java 7 and later support these modes. Additionally, requests must be signed using an access key ID and a secret access key that is associated with an IAM principal, or you can use the Amazon Security Token Service (Amazon STS) to generate temporary security credentials to sign requests.
VPC Endpoints
A virtual private cloud (VPC) endpoint enables you to privately connect your VPC to supported Amazon services and VPC endpoint services powered by Amazon PrivateLink without requiring an internet gateway, NAT device, VPN connection, or Amazon Direct Connect connection. Although S3 Glacier does not support VPC endpoints directly, you can take advantage of Amazon S3 VPC endpoints if you access S3 Glacier as a storage tier integrated with Amazon S3.
For more information about Amazon S3 lifecycle configuration and transitioning objects to the S3 Glacier storage class, see Object Lifecycle Management and Transitioning Objects in the Amazon Simple Storage Service User Guide. For more information about VPC endpoints, see VPC Endpoints in the Amazon VPC User Guide.