Remediation
Enable Encryption for SageMaker Notebook Instances Using Customer-Managed KMS Keysโ
To remediate this violation, create a new SageMaker notebook instance configured with a Customer-Managed Key (CMK) from AWS KMS and migrate any required data from the existing unencrypted instance. The encryption key cannot be modified for an existing notebook instance.
From Command Lineโ
-
Create a new SageMaker notebook instance Ensure that the desired CMK already exists before running the following command:
aws sagemaker create-notebook-instance \
--notebook-instance-name {{new-instance-name}} \
--instance-type {{instance-type}} \
--role-arn {{iam-role-arn}} \
--kms-key-id {{kms-key-arn}} -
Migrate data and remove the non-compliant instance
- Once the new notebook instance is in the
InServicestate, transfer any data, notebooks, or configurations from the old instance. - Thoroughly test the new notebook instance to ensure all data has been migrated correctly and that it functions as expected.
- After confirming successful migration, stop and delete the old instance to prevent unnecessary costs:
aws sagemaker delete-notebook-instance \
--notebook-instance-name {{old-instance-name}} - Once the new notebook instance is in the