How can I securely process and encrypt sensitive data without exposing it to Cloud Infrastructure?

0
0
Asked By CuriousCoder27 On

I'm handling sensitive data that needs to be processed by a large language model (LLM) and then encrypted into a storage bucket. I want to avoid using the default KMS (Key Management Service) for encryption, and I need to ensure that this data is safely decrypted on the client-side using something like webcrypto. The main concern is that this data should not be exposed to any cloud infrastructure during this process. Can anyone validate my approach or provide suggestions on how to achieve this securely?

5 Answers

Answered By SkepticalSeeker84 On

If you're not hosting your own private LLM instance, then using a public one might be your weakest link in security. Just something to think about.

Answered By ThoughtfulTechie12 On

One thing to consider is how you'll handle encryption while the data is being processed by the LLM. That's where it gets tricky because encryption in memory is a bigger challenge compared to encrypting storage or transit.

Answered By CautiousDev44 On

If you trust AWS, using KMS with a CMK can work well without exposing the data to the cloud. You might also want to look into client-side encryption for added security. AWS’s SSE-C (Server-Side Encryption with Customer-Provided Keys) might be another layer to consider, as they never store the encryption key.

Answered By SecureSam99 On

You can definitely use a KMS Customer Master Key (CMK) to encrypt your objects in S3 while keeping everything secure. Just make sure your key management is in place to prevent exposure.

Answered By LayeredSecurityPro On

For added assurance, think about performing layer 7 encryption within your app. If you have concerns about trusting AWS, this can give you more control over your data!

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.