π‘οΈ AWS EFS File System is not encrypted with KMS CMKπ’
- Contextual name: π‘οΈ File System is not encrypted with KMS Customer Master Keyπ’
- ID:
/ce/ca/aws/efs/file-system-cmk-encryption - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [EFS.1] Elastic File System should be configured to encrypt file data at-rest using AWS KMS
- Cloud Conformity: AWS KMS Customer Master Keys for EFS Encryption
Descriptionβ
Hereβs a more polished and professional version of your text, with improved clarity, consistency, and tone while preserving the original meaning:
Descriptionβ
This policy identifies AWS EFS file systems that are encrypted using AWS-managed keys (the default keys applied by the EFS service when no customer-managed keys are specified) rather than AWS KMS customer-managed keys (CMKs). Using CMKs provides greater control over encryption key management, access policies, and auditing capabilities compared to AWS-managed keys.
Rationaleβ
Encrypting data at rest adds an important layer of security by protecting stored data from unauthorized access to the underlying storage. Although AWS provides a default managed key (
aws/elasticfilesystem) for EFS encryption, using a customer-managed keys offers several additional security and governance benefits:
- Enhanced Control: Full ownership of the key lifecycle, including creation, rotation, and permission management.
- Improved Auditing: Detailed key usage visibility through AWS CloudTrail, enabling precise tracking of when and how encryption keys are used.
... see more
Remediationβ
Remediationβ
Encrypt EFS File System Using KMS CMKβ
Encryption at rest for Amazon EFS can only be enabled during the creation of the file system. It is not possible to enable encryption or change the KMS key for an existing file system.
From Command Lineβ
Create a customer-managed KMS key:
aws kms create-key \
--region {{us-east-1}} \
--description "CMK for EFS data encryption"(Optional) Create an alias for the CMK:
aws kms create-alias \
--region {{us-east-1}} \
--alias-name {{alias/efs-cmk}} \
--target-key-id {{cmk-arn}}Create a new EFS file system using the CMK:
aws efs create-file-system \
--region {{us-east-1}} \
--creation-token {{unique-token}} \
--encrypted \
--kms-key-id {{cmk-arn}}Create mount targets for the new file system (repeat for each AZ):
aws efs create-mount-target \
--region {{us-east-1}} \
--file-system-id {{new-file-system-id}} \... see more