This rule ensures that EBS volumes are set to delete on termination for better security.
Rule | Attached EBS volumes should have delete on termination enabled |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Rule Name: EBS Volumes - Enable Delete on Termination for NIST CSF (v1)
Description:
To comply with the NIST Cybersecurity Framework (CSF) version 1, it is recommended to enable the "Delete on Termination" option for all attached Elastic Block Store (EBS) volumes associated with EC2 instances. Enabling this option ensures that when an instance is terminated, all related EBS volumes are also automatically deleted to prevent potential data leakage or unauthorized access.
Troubleshooting Steps (if required):
If an EC2 instance is terminated and the associated EBS volume is not automatically deleted, follow these troubleshooting steps:
Remediation:
Follow these steps to enable the "Delete on Termination" option for EBS volumes associated with EC2 instances:
Step 1: Identify EC2 Instances without "Delete on Termination" enabled:
Step 2: Select an EC2 Instance:
Step 3: Enable "Delete on Termination" for EBS Volumes:
Step 4: Verify Changes:
Configuration Code (if required):
No configuration code is required for this rule. The remediation steps involve modifying the settings through the AWS Management Console.
By following these steps, all attached EBS volumes associated with EC2 instances in compliance with the NIST CSF (v1) will have the "Delete on Termination" option enabled, ensuring automatic deletion upon instance termination.