This rule ensures that all attached EBS volumes have encryption enabled for security.
Rule | Attached EBS volumes should have encryption enabled |
Framework | GxP 21 CFR Part 11 |
Severity | ✔ Medium |
Rule Description:
The rule requires that all attached EBS (Elastic Block Store) volumes should have encryption enabled in order to comply with the GxP (Good x Practice) regulations specified in 21 CFR (Code of Federal Regulations) Part 11. This ensures data security and integrity for sensitive information stored in AWS (Amazon Web Services) infrastructure.
Troubleshooting Steps:
Remediation Steps:
Enable Encryption for EBS Volumes:
Migrate data from unencrypted to encrypted EBS volumes:
Command Line Interface (CLI) Commands:
Check Encryption Status for EBS Volumes:
aws ec2 describe-volumes --query "Volumes[?Encrypted==\`false\`]"
Enable Encryption for EBS Volumes:
aws ec2 create-encrypted-snapshot --source-volume-id <unencrypted_volume_id> --encrypted true --kms-key-id <kms_key_id>
Note: Replace
<unencrypted_volume_id>
with the ID of the unencrypted EBS volume and <kms_key_id>
with the desired AWS KMS key ID.Create Encrypted EBS Volume from Snapshot:
aws ec2 create-volume --snapshot-id <snapshot_id> --encrypted true --kms-key-id <kms_key_id>
Note: Replace
<snapshot_id>
with the ID of the snapshot created from the unencrypted EBS volume.Attach Encrypted EBS Volume to an Instance:
aws ec2 attach-volume --volume-id <encrypted_volume_id> --instance-id <instance_id> --device <device_name>
Note: Replace
<encrypted_volume_id>
with the ID of the newly created encrypted EBS volume, <instance_id>
with the ID of the instance to attach the volume, and <device_name>
with the desired device name (e.g., /dev/sdf
).Conclusion:
By following the above steps and using the provided CLI commands, you can ensure that all attached EBS volumes have encryption enabled to comply with the GxP 21 CFR Part 11 regulations. This enhances data security and protection within your AWS environment.