🛡️ AWS EBS Attached Volume is not encrypted with KMS CMK🟢
- Contextual name: 🛡️ EBS Attached Volume is not encrypted with KMS CMK🟢
- ID:
/ce/ca/aws/ec2/ebs-volume-cmk-encryption - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- AWS Security Hub: [EC2.3] Attached Amazon EBS volumes should be encrypted at-rest
- Cloud Conformity: EBS Encrypted With KMS Customer Master Keys
Description
Description
This policy identifies AWS EBS Volumes that are encrypted using AWS managed keys instead of AWS KMS customer-managed keys. Using customer-managed keys provides greater control over the encryption and decryption process for data stored on EBS volumes. When configured, KMS customer-managed keys are used to encrypt data at rest, EBS snapshots, and disk I/O.
Rationale
Using customer-managed KMS keys to protect EBS data enables granular control over key usage and access permissions, supporting the Principle of Least Privilege (PoLP). Amazon KMS allows you to create, rotate, disable, and audit customer-managed keys, improving governance and auditability of encryption key management.
Audit
This policy flags an AWS EBS Volume as
INCOMPLIANTif either of the following conditions is met:
- No AWS KMS Key is associated with the volume, or
- The AWS KMS Key
Manageris not CUSTOMER.EBS volumes that are not attached to any instance are marked as
INAPPLICABLE.Unencrypted EBS volumes are addressed by the
AWS EBS Attached Volume is not encryptedpolicy and are marked asINAPPLICABLE.
Remediation
Remediation
Encrypt Amazon EBS Volumes
To encrypt Amazon EBS volumes using AWS KMS customer-managed keys (CMKs), perform the following steps.
From Command Line
Create a customer-managed KMS key
KMS_KEY_ARN=$(aws kms create-key \
--region {{us-east-1}} \
--description "Customer-managed CMK for EBS volume encryption" \
--query 'KeyMetadata.Arn' \
--output text)
aws kms create-alias \
--region {{us-east-1}} \
--alias-name {{alias/ebs-encryption-cmk}} \
--target-key-id $KMS_KEY_ARNRe-create the EBS volume using the CMK
Create a snapshot of the source volume:
aws ec2 create-snapshot \
--region {{us-east-1}} \
--volume-id {{volume-id}}Copy the snapshot with encryption enabled:
aws ec2 copy-snapshot \
--region {{us-east-1}} \
--source-region {{us-east-1}} \
--source-snapshot-id {{snapshot-id}} \
--encrypted \
--kms-key-id {{kms-key-arn}}Create a new volume from the encrypted snapshot:
aws ec2 create-volume \... see more