π‘οΈ AWS EMR Cluster encryption is disabledπ’βͺ
- Contextual name: π‘οΈ Cluster encryption is disabledπ’βͺ
- ID:
/ce/ca/aws/emr/cluster-encryption - Tags:
- βͺ Impossible policy
- π’ Policy with categories
- π’ Policy with type
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Similar Policiesβ
- AWS Security Hub: [EMR.3] Amazon EMR security configurations should be encrypted at rest
- AWS Security Hub: [EMR.4] Amazon EMR security configurations should be encrypted in transit
- Cloud Conformity: EMR In-Transit and At-Rest Encryption
Descriptionβ
Descriptionβ
This policy identifies Amazon EMR clusters that are not associated with an EMR security configuration. Security configurations enable encryption and other protective controls to safeguard sensitive data processed and stored by EMR clusters.
Data encryption helps prevent unauthorized access to sensitive information within EMR clusters and their associated storage systems. This includes data stored on persistent media (data at rest) and data transmitted across the network (data in transit).
Rationaleβ
Protecting data throughout its lifecycle is a fundamental security requirement for distributed data processing environments such as Amazon EMR.
Encryption at Rest
Prevents unauthorized access to data stored on local disks or attached Amazon EBS volumes in the event of underlying infrastructure compromise.
Encryption in Transit
Protects data exchanged between EMR nodes (for example, primary and core nodes in the Hadoop ecosystem), reducing the risk of man-in-the-middle attacks within the VPC.
... see more
Remediationβ
Remediationβ
Associate an EMR Cluster with a Security Configurationβ
Amazon EMR security configurations define encryption settings for data at rest and data in transit, as well as other security controls such as Kerberos authentication. Ensure that all new clusters are launched with a security configuration applied.
Note: Security configurations cannot be applied to an existing cluster after it is launched. This remediation applies only to new clusters.
From Command Lineβ
Create or identify an existing security configuration:
aws emr list-security-configurationsaws emr create-security-configuration --name "{{security-config}}" --security-configuration '{
"EncryptionConfiguration": {
"EnableInTransitEncryption": true,
"EnableAtRestEncryption": true,
"InTransitEncryptionConfiguration": {
"TLSCertificateConfiguration": {
"CertificateProviderType": "PEM",
"S3Object": "arn:aws:s3:::{{MyConfigStore}}/{{artifacts}}/{{MyCerts}}.zip"... see more