π‘οΈ AWS Redshift Cluster is not encrypted at restπ’
- Contextual name: π‘οΈ Cluster is not encrypted at restπ’
- ID:
/ce/ca/aws/redshift/cluster-ecryption-at-rest - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [Redshift.10] Redshift clusters should be encrypted at rest
Descriptionβ
Descriptionβ
This policy identifies AWS Redshift Clusters that do not have encryption at rest enabled.
Rationaleβ
Encryption at rest is a fundamental security control that ensures only authorized users with the appropriate AWS KMS permissions can access cluster data. It protects sensitive information by making it unreadable in the event that physical storage media is compromised.
Auditβ
This policy flags an Amazon Redshift Cluster as
INCOMPLIANTif Encryption is not set to Enabled.
Remediationβ
Remediationβ
Enable Encryption at Restβ
To secure your Amazon Redshift cluster, enable encryption at rest using AWS KMS. When you enable encryption, Redshift automatically migrates your data to a new encrypted cluster. During this migration, the cluster remains available in read-only mode, and the cluster status appears as resizing.
Note: If cross-region snapshot copy is enabled, you must disable it before enabling encryption.
From Command Lineβ
Use the following AWS CLI command to modify an unencrypted cluster and enable encryption. By default, the cluster uses the AWS-managed KMS key. To use a customer-managed key, include the
--kms-key-idoption:aws redshift modify-cluster \
--cluster-identifier {{cluster-id}} \
--encrypted \
--kms-key-id {{kms-key-id}}