Skip to main content

🛡️ AWS EBS Snapshot is not encrypted🟢

Logic

Similar Policies

Description

Open File

Description

This policy identifies AWS EBS snapshots that are not encrypted. EBS snapshots can contain sensitive or critical data, and enabling encryption helps protect this data at rest. Snapshot encryption is handled transparently by AWS and does not require any changes to your server instances or applications.

Rationale

Encrypting EBS snapshots ensures that data is protected from unauthorized access. If an unencrypted snapshot is shared or accessed by an unauthorized entity, the data it contains may be exposed.

EBS snapshot encryption uses the AES-256 encryption algorithm and is fully managed by AWS through the Amazon Key Management Service (KMS), ensuring secure key storage and access control.

Audit

This policy flags an AWS EBS Snapshot as INCOMPLIANT if the Encrypted field is set to false.

Remediation

Open File

Remediation

Encrypt an Existing EBS Snapshot

From Console
  1. Sign in to the AWS Management Console.

  2. Navigate to the Amazon EC2 dashboard.

  3. In the left navigation pane, under Elastic Block Store, choose Snapshots.

  4. Select the unencrypted EBS snapshot to be encrypted.

  5. Choose Actions from the top menu and select Copy snapshot.

  6. In the Copy snapshot dialog, perform the following:

    • Select the Destination Region where the encrypted copy will be created.

    • (Optional) Update the snapshot Description.

    • Select Encrypt this snapshot.

    • Choose the KMS key to use for encryption.

      • If no customer-managed KMS keys are available, select the default key (default) aws/ebs.
    • Choose Copy snapshot to start the encryption process.

  7. Once the encrypted snapshot copy is created, verify its status on the Snapshots page.

  8. After confirming the encrypted snapshot is available, delete the original unencrypted snapshot:

    • Select the unencrypted snapshot.
    • Choose ActionsDelete snapshot.

... see more

policy.yaml

Open File

Linked Framework Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EC2.3] Attached Amazon EBS volumes should be encrypted at-rest3no data
💼 Cloudaware Framework → 💼 Data Encryption70no data
💼 FedRAMP High Security Controls → 💼 CM-3(6) Cryptography Management (H)17no data
💼 FedRAMP High Security Controls → 💼 SC-7(10) Prevent Exfiltration (H)18no data
💼 FedRAMP High Security Controls → 💼 SC-13 Cryptographic Protection (L)(M)(H)1643no data
💼 FedRAMP High Security Controls → 💼 SC-28 Protection of Information at Rest (L)(M)(H)1736no data
💼 FedRAMP High Security Controls → 💼 SC-28(1) Cryptographic Protection (L)(M)(H)525no data
💼 FedRAMP Low Security Controls → 💼 SC-13 Cryptographic Protection (L)(M)(H)43no data
💼 FedRAMP Low Security Controls → 💼 SC-28 Protection of Information at Rest (L)(M)(H)136no data
💼 FedRAMP Low Security Controls → 💼 SC-28(1) Cryptographic Protection (L)(M)(H)25no data
💼 FedRAMP Moderate Security Controls → 💼 SC-13 Cryptographic Protection (L)(M)(H)43no data
💼 FedRAMP Moderate Security Controls → 💼 SC-28 Protection of Information at Rest (L)(M)(H)136no data
💼 FedRAMP Moderate Security Controls → 💼 SC-28(1) Cryptographic Protection (L)(M)(H)25no data
💼 NIST CSF v2.0 → 💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected187no data
💼 NIST CSF v2.0 → 💼 PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected160no data
💼 NIST CSF v2.0 → 💼 PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected184no data
💼 NIST SP 800-53 Revision 5 → 💼 CA-9(1) Internal System Connections _ Compliance Checks54no data
💼 NIST SP 800-53 Revision 5 → 💼 CM-3(6) Configuration Change Control _ Cryptography Management17no data
💼 NIST SP 800-53 Revision 5 → 💼 SC-7(10) Boundary Protection _ Prevent Exfiltration18no data
💼 NIST SP 800-53 Revision 5 → 💼 SC-13 Cryptographic Protection432no data
💼 NIST SP 800-53 Revision 5 → 💼 SC-28 Protection of Information at Rest31737no data
💼 NIST SP 800-53 Revision 5 → 💼 SC-28(1) Protection of Information at Rest _ Cryptographic Protection1025no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-7(6) Software, Firmware, and Information Integrity _ Cryptographic Protection27no data