This rule ensures that encryption at rest is enabled for API Gateway stage cache.
Rule | API Gateway stage cache encryption at rest should be enabled |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Rule Description
The rule requires enabling encryption at rest for the cache in Amazon API Gateway stages. This rule specifically targets the NIST Cybersecurity Framework (CSF) version 1 compliance.
Troubleshooting Steps
If you encounter any issues implementing this rule, consider the following troubleshooting steps:
Necessary Code
To enable encryption at rest for the cache in API Gateway stages, you can utilize the AWS Management Console or AWS Command Line Interface (CLI) with the necessary code snippets provided below.
AWS Management Console
AWS CLI
$ aws apigateway update-stage --rest-api-id <rest-api-id> --stage-name <stage-name> --patch-operations op=replace,path=/cacheClusterEnabled,value=true op=replace,path=/noCache,value=false op=replace,path=/cacheClusterSize,value=<cache-cluster-size> op=replace,path=/cacheDataEncrypted,value=true
Replace the following placeholders with appropriate values:
<rest-api-id>
: The identifier of your API in API Gateway.<stage-name>
: The name of the specific stage where you want to enable encryption at rest for the cache.<cache-cluster-size>
: The size of your cache cluster. Choose an appropriate value based on your requirements.Remediation Steps
Follow the step-by-step guide below to remediate the rule violation by enabling cache encryption at rest for the API Gateway stage:
Ensure that you have proper documentation and communication processes in place to inform relevant stakeholders about the implementation of this rule.