This rule ensures that EBS volumes are secure with encryption enabled.
Rule | Attached EBS volumes should have encryption enabled |
Framework | CISA-cyber-essentials |
Severity | ✔ Medium |
Rule Description
The rule requires that all attached EBS (Elastic Block Store) volumes should have encryption enabled. This is a mandatory security measure to comply with the CISA Cyber Essentials guidelines.
Troubleshooting Steps
If an attached EBS volume does not have encryption enabled, follow the steps below for troubleshooting:
Verify Encryption Status: Check the encryption status of the EBS volume by logging into the AWS Management Console or using the AWS CLI (Command Line Interface).
Encryption Not Enabled: If the encryption status shows as "Not Enabled," proceed with the remediation steps.
Remediation Steps
To enable encryption for an attached EBS volume, follow the step-by-step guide below:
Using AWS Management Console
Log into the AWS Management Console.
Navigate to the Amazon EC2 dashboard.
Select "Volumes" from the sidebar menu.
Identify the unencrypted EBS volume that needs encryption enabled.
Right-click on the volume, and select "Modify Volume."
In the "Modify Volume" dialog box, select the encryption option.
Choose the desired encryption key or create a new one.
Click on "Modify" to apply the changes.
Using AWS CLI
Install and configure the AWS CLI on your local machine if not already done.
Open the command-line interface or terminal.
Run the following command to enable encryption for an EBS volume:
aws ec2 modify-volume --volume-id <volume-id> --encrypted
Replace
<volume-id>
with the actual ID of the unencrypted volume.Verify the encryption status using the following command:
aws ec2 describe-volumes --volume-ids <volume-id> --query "Volumes[].{ID:VolumeId,Encryption:Encrypted}" --output table
Replace
<volume-id>
with the actual ID of the volume.Additional Notes
Enabling encryption for attached EBS volumes ensures that data on the volumes is protected at rest.
Regularly audit and monitor EBS volumes to ensure compliance with the CISA Cyber Essentials requirements.
It is recommended to automate the encryption process using infrastructure-as-code tools like AWS CloudFormation or AWS CDK, to ensure consistent deployment and compliance across multiple instances and volumes.