This rule requires enabling rotation for customer created CMKs to maintain security standards.
Rule | Ensure rotation for customer created CMKs is enabled |
Framework | cis_v140 |
Severity | ✔ High |
Rule Description: Rotation for Customer Created CMKs Enabled
Rule Summary:
The policy requires that rotation is enabled for Customer Master Keys (CMKs) created by customers. CMK rotation ensures the security of encryption keys used for data protection in AWS Key Management Service (KMS). By enabling rotation, you ensure that the cryptographic material used in the CMKs is periodically refreshed, reducing the risk of key compromise.
Troubleshooting Steps:
If rotation for customer created CMKs is not enabled, follow these troubleshooting steps:
Identify CMKs: Identify the CMKs for which rotation is not enabled.
Review Key Policies: Review the key policies associated with those CMKs to verify if rotation is disabled in any of them.
Modify Key Policy: Modify the key policy of each CMK that has rotation disabled and enable rotation.
Recheck Rotation Status: Verify that rotation is now enabled for the CMKs.
Necessary Code:
If you prefer to automate the process using the AWS Command Line Interface (CLI), below is the necessary code to enable rotation for a CMK:
aws kms enable-key-rotation --key-id [CMK_ID]
Replace
[CMK_ID]
with the actual CMK ID for which you want to enable rotation.Step-by-Step Guide to Enable Rotation for CMKs:
Identify Customer Created CMKs
Access CMKs
Check Rotation Status
Manage Key Policies
Edit Key Policy
Validate Rotation Status
Repeat for other CMKs
Conclusion:
Enabling rotation for customer created CMKs ensures the continuous security and protection of encryption keys used in AWS Key Management Service. By following the step-by-step guide and troubleshooting steps, you can easily enable rotation for CMKs and maintain the highest level of key security for your applications and data.