Skip to main content

๐Ÿ›ก๏ธ AWS RDS Instance Encryption is not enabled๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Instance Encryption is not enabled๐ŸŸข
  • ID: /ce/ca/aws/rds/instance-encryption
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Similar Policiesโ€‹

Similar Internal Rulesโ€‹

RulePoliciesFlags
โœ‰๏ธ dec-x-6ba5ecd21

Descriptionโ€‹

Open File

Descriptionโ€‹

Amazon RDS encrypted DB instances use the industry standard AES-256 encryption algorithm to encrypt your data on the server that hosts your Amazon RDS DB instances. After your data is encrypted, Amazon RDS handles authentication of access and decryption of your data transparently with a minimal impact on performance.

Rationaleโ€‹

Databases are likely to hold sensitive and critical data, it is highly recommended to implement encryption in order to protect your data from unauthorized access or disclosure. With RDS encryption enabled, the data stored on the instance's underlying storage, the automated backups, read replicas, and snapshots, are all encrypted.

Auditโ€‹

From Consoleโ€‹
  1. Login to the AWS Management Console and open the RDS dashboard at https://console.aws.amazon.com/rds/.
  2. In the navigation pane, under RDS dashboard, click Databases.
  3. Select the RDS Instance that you want to examine.
  4. Click Instance Name to see details, then click on Configuration tab.
  5. Under Configuration Details section, In Storage pane search for the Encryption Enabled Status.

... see more

Remediationโ€‹

Open File

Remediationโ€‹

From Consoleโ€‹

  1. Login to the AWS Management Console and open the RDS dashboard at https://console.aws.amazon.com/rds/.

  2. In the left navigation panel, click on Databases.

  3. Select the Database instance that needs to be encrypted.

  4. Click on Actions button placed at the top right and select Take Snapshot.

  5. On the Take Snapshot page, enter a database name of which you want to take a snapshot in the Snapshot Name field and click on Take Snapshot.

  6. Select the newly created snapshot and click on the Action button placed at the top right and select Copy snapshot from the Action menu.

  7. On the Make Copy of DB Snapshot page, perform the following:

    • In the New DB Snapshot Identifier field, Enter a name for the new snapshot.
    • Check Copy Tags, New snapshot must have the same tags as the source snapshot.
    • Select Yes from the Enable Encryption dropdown list to enable encryption, You can choose to use the AWS default encryption key or custom key from Master Key dropdown list.

... see more

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ APRA CPG 234 โ†’ ๐Ÿ’ผ 52c appropriate encryption, cleansing and auditing of devices;1010no data
๐Ÿ’ผ AWS Foundational Security Best Practices v1.0.0 โ†’ ๐Ÿ’ผ [RDS.3] RDS DB instances should have encryption at-rest enabled11no data
๐Ÿ’ผ AWS Well-Architected โ†’ ๐Ÿ’ผ SEC08-BP02 Enforce encryption at rest19no data
๐Ÿ’ผ CIS AWS v1.4.0 โ†’ ๐Ÿ’ผ 2.3.1 Ensure that encryption is enabled for RDS Instances11no data
๐Ÿ’ผ CIS AWS v1.5.0 โ†’ ๐Ÿ’ผ 2.3.1 Ensure that encryption is enabled for RDS Instances - Level 1 (Automated)11no data
๐Ÿ’ผ CIS AWS v2.0.0 โ†’ ๐Ÿ’ผ 2.3.1 Ensure that encryption-at-rest is enabled for RDS Instances - Level 1 (Automated)11no data
๐Ÿ’ผ CIS AWS v3.0.0 โ†’ ๐Ÿ’ผ 2.3.1 Ensure that encryption-at-rest is enabled for RDS Instances - Level 1 (Automated)11no data
๐Ÿ’ผ CIS AWS v4.0.0 โ†’ ๐Ÿ’ผ 2.2.1 Ensure that encryption-at-rest is enabled for RDS instances (Automated)1no data
๐Ÿ’ผ CIS AWS v4.0.1 โ†’ ๐Ÿ’ผ 2.2.1 Ensure that encryption-at-rest is enabled for RDS instances (Automated)1no data
๐Ÿ’ผ CIS AWS v5.0.0 โ†’ ๐Ÿ’ผ 2.2.1 Ensure that encryption-at-rest is enabled for RDS instances (Automated)1no data
๐Ÿ’ผ CIS AWS v6.0.0 โ†’ ๐Ÿ’ผ 3.2.1 Ensure that encryption-at-rest is enabled for RDS instances (Automated)1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Data Encryption67no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ AC-4(4) Flow Control of Encrypted Information (H)2627no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CM-3(6) Cryptography Management (H)16no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ SC-7(10) Prevent Exfiltration (H)16no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ SC-13 Cryptographic Protection (L)(M)(H)1641no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ SC-28 Protection of Information at Rest (L)(M)(H)1735no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ SC-28(1) Cryptographic Protection (L)(M)(H)524no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ SC-13 Cryptographic Protection (L)(M)(H)41no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ SC-28 Protection of Information at Rest (L)(M)(H)135no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ SC-28(1) Cryptographic Protection (L)(M)(H)24no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ SC-13 Cryptographic Protection (L)(M)(H)41no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ SC-28 Protection of Information at Rest (L)(M)(H)135no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ SC-28(1) Cryptographic Protection (L)(M)(H)24no data
๐Ÿ’ผ GDPR โ†’ ๐Ÿ’ผ Art. 25 Data protection by design and by default1010no data
๐Ÿ’ผ GDPR โ†’ ๐Ÿ’ผ Art. 32 Security of processing55no data
๐Ÿ’ผ ISO/IEC 27001:2013 โ†’ ๐Ÿ’ผ A.10.1.1 Policy on the use of cryptographic controls1819no data
๐Ÿ’ผ ISO/IEC 27001:2022 โ†’ ๐Ÿ’ผ 5.33 Protection of records1015no data
๐Ÿ’ผ NIST CSF v1.1 โ†’ ๐Ÿ’ผ PR.DS-1: Data-at-rest is protected1530no data
๐Ÿ’ผ NIST CSF v1.1 โ†’ ๐Ÿ’ผ PR.DS-5: Protections against data leaks are implemented4791no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected180no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected156no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected176no data
๐Ÿ’ผ NIST SP 800-53 Revision 4 โ†’ ๐Ÿ’ผ SC-28 PROTECTION OF INFORMATION AT REST233no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ AC-4(2) Information Flow Enforcement _ Processing Domains3133no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CA-9(1) Internal System Connections _ Compliance Checks43no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CM-3(6) Configuration Change Control _ Cryptography Management16no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SC-7(10) Boundary Protection _ Prevent Exfiltration16no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SC-13 Cryptographic Protection430no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SC-28 Protection of Information at Rest31736no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SC-28(1) Protection of Information at Rest _ Cryptographic Protection1024no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-7(6) Software, Firmware, and Information Integrity _ Cryptographic Protection25no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 3.4.1 If disk encryption is used, logical access must be managed separately and independently of native operating system authentication and access control mechanisms.712no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 3.3.2 SAD that is stored electronically prior to completion of authorization is encrypted using strong cryptography.13no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 3.5.1.3 If disk-level or partition-level encryption is used (rather than file-, column-, or field--level database encryption) to render PAN unreadable.12no data
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 3.3.2 SAD that is stored electronically prior to completion of authorization is encrypted using strong cryptography.813no data
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 3.5.1.3 If disk-level or partition-level encryption is used (rather than file-, column-, or field--level database encryption) to render PAN unreadable.12no data
๐Ÿ’ผ SOC 2 โ†’ ๐Ÿ’ผ CC6.1-10 Uses Encryption to Protect Data611no data