This rule ensures that rotation for customer created symmetric CMKs is enabled.
Rule | Ensure rotation for customer created symmetric CMKs is enabled |
Framework | cis_v150 |
Severity | ✔ Medium |
Rule Description:
The rule "Ensure rotation for customer created symmetric CMKs is enabled" ensures that rotation is enabled for customer-created symmetric Customer Master Keys (CMKs) in AWS Key Management Service (KMS). This is done to enhance the security of encryption keys by regularly rotating them.
By enabling key rotation, AWS KMS will automatically generate a new CMK that is identical to the original key, and the original key will be set to a "Disabled" state, preventing any further usage. This helps protect against unauthorized access and usage of encryption keys.
Troubleshooting Steps (if applicable):
If the rotation for customer-created symmetric CMKs is not enabled, the following troubleshooting steps can be followed:
Remediation:
To enable rotation for customer-created symmetric CMKs, follow the step-by-step guide below:
Replaceaws kms get-key-policy --key-id <CMK_ID> --policy-name default > policy.json
<CMK_ID>
with the key identifier of the CMK.policy.json
file.Note: Replace{ "Version": "2012-10-17", "Statement": [ { "Sid": "EnableKeyRotation", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::123456789012:root" }, "Action": "kms:EnableKeyRotation", "Resource": "*" } ] }
123456789012
with your AWS account ID.policy.json
file.Replaceaws kms put-key-policy --key-id <CMK_ID> --policy-name default --policy file://policy.json
<CMK_ID>
with the key identifier of the CMK.By following these steps, rotation for customer-created symmetric CMKs should now be enabled, ensuring improved security for encryption keys in AWS KMS.