Checks if OpenSearch domains are configured with encryption at rest to protect sensitive data, ensuring compliance with PCI DSS and NIST standards.
| Rule | OpenSearch domains should have encryption at rest enabled |
| Framework | PCI v3.2.1 |
| Severity | ✔ Medium |
Rule Description:
Ensuring that OpenSearch domains have encryption at rest enabled is essential for compliance with PCI v3 standards. Encryption at rest helps protect sensitive data stored in the OpenSearch domain from unauthorized access and ensures data security and privacy.
Troubleshooting Steps:
If encryption at rest is not enabled for the OpenSearch domain, follow these steps to troubleshoot and enable it:
Necessary Codes:
If encryption at rest is not enabled, use the following AWS CLI command to update the OpenSearch domain configuration and enable encryption at rest:
aws opensearch update-domain-config --domain-name <domain-name> --advanced-security-options Enabled=true,InternalUserDatabaseEnabled=true,NodeToNodeEncryptionOptions={Enabled=true},EncryptionAtRestOptions={Enabled=true}
Replace
<domain-name> with the actual name of your OpenSearch domain.Step-by-Step Guide for Remediation:
By following these steps and using the provided AWS CLI command, you can ensure that encryption at rest is enabled for OpenSearch domains, meeting the security requirements for PCI v3 compliance.