- Replication within the cluster and backups to S3
- Encryption of data at rest and in transit
- Use of multiple Availability Zones (AZs)
- Implementation of role-based access control (RBAC)