This rule ensures all S3 buckets employ encryption-at-rest.
Rule | Ensure all S3 buckets employ encryption-at-rest |
Framework | cis_v140 |
Severity | ✔ High |
Rule Description
The rule cis_v140 requires that all S3 buckets employ encryption-at-rest. Encryption-at-rest ensures that data stored in S3 buckets is protected and inaccessible to unauthorized individuals even if the physical storage devices are compromised.
Troubleshooting Steps
Necessary Code
No specific code is provided for this policy.
Step-by-Step Guide for Remediation
Follow these steps to ensure that encryption-at-rest is enabled for S3 buckets:
Sign in to the AWS Management Console.
Open the Amazon S3 service.
Select the S3 bucket you want to enable encryption-at-rest for.
Click on the "Properties" tab.
Under "Default encryption," check if encryption is enabled. If not, click on "Edit."
Choose the encryption algorithm you want to use (e.g., SSE-S3, SSE-KMS, or SSE-C) and configure the settings accordingly.
If using SSE-KMS, select the Key Management Service (KMS) key you want to use from the drop-down list.
Click "Save" to apply the encryption settings.
Repeat steps 3-8 for each S3 bucket to ensure all buckets are encrypted-at-rest.
It is recommended to regularly review the encryption settings and perform audits to ensure adherence to this policy.