🛡️ AWS EBS Attached Volume is not encrypted🟢
- Contextual name: 🛡️ EBS Attached Volume is not encrypted🟢
- ID:
/ce/ca/aws/ec2/ebs-volume-encryption - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- AWS Security Hub: [EC2.3] Attached Amazon EBS volumes should be encrypted at-rest
Description
Description
Ensure that all attached AWS EBS volumes are encrypted at rest using AWS-managed or customer-managed keys. Encryption provides a critical layer of data protection and should be enforced for all in-use volumes.
Rational
Encrypting EBS volumes at rest helps safeguard sensitive data from unauthorized access in the event of physical compromise or internal misuse. Enforcing encryption for all attached volumes ensures that data is protected during operation and aligns with security best practices and compliance requirements.
Audit
This policy flags an AWS EBS Volume as
INCOMPLIANTif theEncryptedcheckbox is set to false and the Volume is currently attached to an EC2 instance.Volumes that are not attached to any instance are marked as
INAPPLICABLE.
Remediation
Remediation
AWS EBS does not support in-place encryption of existing unencrypted volumes. To encrypt an unencrypted volume, you must create a snapshot of the volume and then use that snapshot to create a new encrypted volume.
Optionally, you can enable encryption by default to ensure that all future EBS volumes are automatically encrypted, including those created from unencrypted snapshots.
From Command Line
Enable Default Encryption
This ensures that all new volumes created in the specified region are encrypted by default:
aws ec2 enable-ebs-encryption-by-default --region {{region}}Create a Snapshot of the Unencrypted Volume
aws ec2 create-snapshot \
--volume-id {{volume-id}} \
--description "{{Snapshot description}}"Wait until the snapshot status is
completedbefore proceeding.Create a New Encrypted Volume from the Snapshot
aws ec2 create-volume
--snapshot-id {{snapshot-id}}
--availability-zone {{us-east-1a}}
--encrypted