You control the encryption keys, not just the data
1 controls use Customer-Managed Keys (CMK) for implementation.
See how Customer-Managed Keys (CMK) compares to other access control approaches with our detailed comparison table.
Compare Technologies