Configuring database encryption using the Amazon Redshift API and Amazon CLI - Amazon Redshift
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Configuring database encryption using the Amazon Redshift API and Amazon CLI

Use the Amazon Redshift API and Amazon Command Line Interface (Amazon CLI) to configure encryption key options for Amazon Redshift databases. For more information about database encryption, see Amazon Redshift database encryption.

Configuring Amazon Redshift to use Amazon KMS encryption keys using the Amazon Redshift API and Amazon CLI

You can use the following Amazon Redshift API actions to configure Amazon Redshift to use Amazon KMS encryption keys.

You can use the following Amazon Redshift CLI operations to configure Amazon Redshift to use Amazon KMS encryption keys.

Configuring Amazon Redshift to use an HSM using the Amazon Redshift API and Amazon CLI

You can use the following Amazon Redshift API actions to manage hardware security modules.

You can use the following Amazon CLI operations to manage hardware security modules.

Rotating encryption keys using the Amazon Redshift API and Amazon CLI

You can use the following Amazon Redshift API actions to rotate encryption keys.

You can use the following Amazon CLI operations to rotate encryption keys.