Check if EBS default encryption is enabled to enhance data security.
Rule | EBS default encryption should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description
EBS default encryption should be enabled for compliance with NIST 800-53 Revision 5. This rule ensures that any new EBS volumes created in AWS are automatically encrypted to protect sensitive data at rest in the cloud environment.
Troubleshooting
If EBS default encryption is not enabled, the following troubleshooting steps may be helpful:
describe-volumes
command.Code
Here is an example AWS CloudFormation code snippet that enables EBS default encryption:
Resources:
MyDefaultEncryption:
Type: "AWS::EBS::DefaultKmsKey"
Properties:
KeyArn: "arn:aws:kms:us-east-1:123456789012:key/abcd1234-5678-90ab-cdef-1234567890ab"
Replace
"arn:aws:kms:us-east-1:123456789012:key/abcd1234-5678-90ab-cdef-1234567890ab"
with the ARN (Amazon Resource Name) of the desired AWS Key Management Service (KMS) key.Remediation Steps
To enable EBS default encryption, follow these steps:
Alternatively, you can use the AWS CLI to enable EBS default encryption by running the following command:
aws ec2 modify-account-attribute --account-attribute-name defaultEncryption --default-encryption-enabled
Ensure that you have the necessary IAM permissions to modify account attributes.
Conclusion
Enabling EBS default encryption ensures that all new EBS volumes are automatically encrypted, providing an extra layer of data protection in accordance with NIST 800-53 Revision 5. By following the remediation steps provided, you can ensure compliance and enhance the security of your AWS environment.