π AWS Backup Vault contains unencrypted Recovery Points π’
- Contextual name: π Vault contains unencrypted Recovery Points π’
- ID:
/ce/ca/aws/backup/vault-contains-unencrypted-recovery-points
- Located in: π AWS Backup
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- AWS Security Hub
- [[Backup.1] AWS Backup recovery points should be encrypted at rest]([Backup.1] AWS Backup recovery points should be encrypted at rest (https://docs.aws.amazon.com/securityhub/latest/userguide/backup-controls.html#backup-1)]
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Ensure that all Recovery Points stored within an AWS Backup Vault are encrypted. AWS Backup offers centralized backup and recovery capabilities, enforcing encryption on recovery points is a critical security measure to protect data at rest.
Rationaleβ
Encrypting backup data is essential to protect sensitive information (such as application assets, customer records, and proprietary intellectual property) from unauthorized access. Unencrypted recovery points risk data breaches and can lead to regulatory fines or reputational damage.
Impactβ
If an unauthorized user with access to the vaultβs storage location could restore and inspect unencrypted backups.
Enabling encryption may incur additional charges for KMS key usage and management. The IAM role performing backup and restore operations must have permissions to use the specified KMS key.
Auditβ
This policy flags an AWS Backup Backup Vault as
INCOMPLIANT
if at least one relatedAWS Backup Recovery Point
is not encrypted with a KMS key indicated by theKMS Master Key ID
field being empty.
Remediationβ
Remediationβ
AWS Backup supports independent encryption for all fully managed resource types. Independent encryption lets you choose a distinct KMS key for your recovery points, separate from the source resourceβs encryption. For example, you can back up an Amazon S3 bucket encrypted with SSE-S3 but store its recovery points under a customer-managed KMS key in your backup vault.
Resources Supporting Independent Encryptionβ
AWS Backup encrypts vaults with a KMS key by default. All recovery points stored in the vault that support independent encryption will adopt the vaultβs KMS key, even if the original resource is unencrypted.
Resources Not Supporting Independent Encryptionβ
For resource types not yet fully integrated with AWS Backupβs independent encryption (e.g., RDS or EBS), recovery points inherit the encryption settings of the source resource. Review the service-specific documentation (e.g., Amazon EBS encryption) to adjust encryption on the source resource.
IAM and KMS Permissionsβ
Ensure the principal (role or user) executing backup and restore operations has the necessary KMS actions in its IAM policy. Confirm the KMS key policy grants the principal permission to use the key. Without proper permissions, Backup jobs will report success, but individual recovery point objects will not be backed up or restored, resulting in unnoticed data gaps.