Description
Elastic Compute Cloud (EC2) supports encryption at rest when using the Elastic Block Store (EBS) service. While disabled by default, forcing encryption at EBS volume creation is supported.
Rationaleβ
Encrypting data at rest reduces the likelihood that it is unintentionally exposed and can nullify the impact of disclosure if the encryption remains unbroken.
Impactβ
Losing access or removing the KMS key in use by the EBS volumes will result in no longer being able to access the volumes.
Auditβ
From Consoleβ
- Login to AWS Management Console and open the Amazon EC2 console using https://console.aws.amazon.com/ec2/.
- Under
Account attributes
, clickEBS encryption
. - Verify
Always encrypt new EBS volumes
displaysEnabled
. - Review every region in-use.
Note: EBS volume encryption is configured per region.
From Command Lineβ
- Run:
aws --region <region> ec2 get-ebs-encryption-by-default
- Verify that
"EbsEncryptionByDefault": true
is displayed. - Review every region in-use.
Note: EBS volume encryption is configured per region.
Referencesβ
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
- https://aws.amazon.com/blogs/aws/new-opt-in-to-default-encryption-for-new-ebs-volumes/
Additional Informationβ
Default EBS volume encryption only applies to newly created EBS volumes. Existing EBS volumes are not converted automatically.