This rule ensures encryption of RDS cluster snapshots and database snapshots at rest.
Rule | RDS cluster snapshots and database snapshots should be encrypted at rest |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ Medium |
Rule Description:
This rule enforces the encryption at rest for RDS cluster snapshots and database snapshots in order to comply with the AWS Foundational Security Best Practices. Encrypting these snapshots helps to protect sensitive data stored in these resources.
Rule Remediation:
To remediate this rule, follow the step-by-step guide below:
1. Encrypt RDS Cluster Snapshots:
Option 1: Enable Encryption during Snapshot Creation (Console):
Option 2: Enable Encryption for Existing Snapshots (Console):
Option 3: Enable Encryption during Snapshot Creation (AWS CLI):
aws rds create-db-cluster-snapshot \ --db-cluster-snapshot-identifier <snapshot_identifier> \ --db-cluster-identifier <db_cluster_identifier> \ --enable-iam-database-authentication \ --kms-key-id <kms_key_id>
Replace
<snapshot_identifier>
, <db_cluster_identifier>
, and <kms_key_id>
with your own values.2. Encrypt RDS Database Snapshots:
Option 1: Enable Encryption during Snapshot Creation (Console):
Option 2: Enable Encryption for Existing Snapshots (Console):
Option 3: Enable Encryption during Snapshot Creation (AWS CLI):
aws rds create-db-snapshot \ --db-snapshot-identifier <snapshot_identifier> \ --db-instance-identifier <db_instance_identifier> \ --enable-iam-database-authentication \ --kms-key-id <kms_key_id>
Replace
<snapshot_identifier>
, <db_instance_identifier>
, and <kms_key_id>
with your own values.Troubleshooting Steps (if applicable):
If you encounter any issues while enabling encryption for RDS cluster snapshots or database snapshots, consider the following troubleshooting steps:
If the troubleshooting steps do not resolve the issue, consider reaching out to AWS Support for further assistance.
Please note that the above instructions are specific to AWS RDS cluster and database snapshots. Different resources and services may have different encryption procedures.