Ensure that the AWS EBS volume snapshots that hold sensitive and critical data are encrypted to fulfill compliance requirements for data-at-rest encryption. The EBS snapshot data encryption and decryption is handled transparently and does not require any additional actions from your application.
This rule can help you with the following compliance standards:
- PCI
- HIPAA
- GDPR
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
When dealing with production data that is crucial to your business, it is highly recommended to implement data encryption in order to protect it from attackers or unauthorized personnel. The EBS volume snapshot encryption keys are using AES-256 algorithm and are entirely managed and protected by the AWS key management infrastructure through Amazon Key Management Service (KMS).
Audit
To identify any unencrypted EBS volume snapshots available within your AWS account, perform the following:
Remediation / Resolution
To encrypt existing EBS volume snapshots available within your AWS account, perform the following:
References
- AWS Documentation
- Amazon EBS Snapshots
- Copying an Amazon EBS Snapshot
- AWS Command Line Interface (CLI) Documentation
- ec2
- describe-snapshots
- copy-snapshot
- delete-snapshot