This rule ensures that EBS default encryption is enabled to protect data at rest.
Rule | EBS default encryption should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description
According to NIST 800-53 Revision 5 guidelines, it is recommended to enable default encryption for Amazon Elastic Block Store (EBS) volumes to enhance data security and protect against unauthorized access. This rule ensures that all newly created EBS volumes are automatically encrypted using AWS Key Management Service (KMS) managed keys.
Enabling default encryption provides an additional layer of protection by encrypting data at rest, helping organizations meet compliance requirements and safeguard sensitive information.
Troubleshooting Steps
If default encryption for EBS volumes is not enabled, follow these troubleshooting steps:
Validate EBS Encryption Status:
Verify AWS Key Management Service (KMS) Configuration:
Enable Default Encryption for EBS Volumes:
aws ec2 enable-ebs-encryption-by-default
Remediation Steps
To enable default encryption for EBS volumes:
Open the AWS Command Line Interface (CLI) or AWS CloudShell.
Use the following AWS CLI command to enable default encryption:
aws ec2 enable-ebs-encryption-by-default
Wait for the command to complete and validate that default encryption is now enabled by checking the encryption status of newly created EBS volumes.
Note: Enabling default encryption will only affect newly created EBS volumes. Existing unencrypted EBS volumes will not be automatically encrypted. Those volumes need to be manually encrypted, or the data should be migrated to newly created encrypted volumes.
Additional Information