Redshift

Protector for Amazon Redshift.

This section describes the high-level architecture of the product on AWS for integration with Amazon Redshift, the installation procedures, and provides guidance on performance. This section focuses on Protegrity-specific aspects and should be consumed with corresponding Redshift documentation.

This guide may also be used with the Protegrity Enterprise Security Administrator Guide, which explains the mechanism for managing the data security policy.


Overview

Solution overview and features.

Architecture

Deployment architecture and connectivity

Installation

Instructions for installing Protect Service, Policy Agent, and Log Forwarder.

Understanding Redshift Objects

Key concepts in understanding the Protegrity Cloud Protect with Redshift.

Performance

Benchmarks and performance tuning

Audit Logging

Audit log description/formatting

No Access Behavior

Describes the result of various policy configurations with no access operations

Known Limitations

Known product limitations.

Upgrading To The Latest Version

Instructions for upgrading the protector.

Appendices

Additional references for the protector.


Last modified : November 27, 2025