Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: KMS keys should not be pending deletion

This rule ensures that KMS keys are not in a pending deletion state for data security.

RuleKMS keys should not be pending deletion
FrameworkHIPAA
Severity
High

HIPAA Compliance Rule: KMS Keys Pending Deletion

Description:

HIPAA (Health Insurance Portability and Accountability Act) is a regulatory framework that outlines the requirements for protecting sensitive healthcare data. As part of HIPAA compliance, any pending deletion status for AWS KMS (Key Management Service) keys should be avoided. KMS keys are used to encrypt and decrypt data stored within AWS services and applications.

Pending deletion status means that a KMS key has been scheduled for permanent deletion but has not yet been completely removed from the AWS account. It is important to ensure that there are no KMS keys in the pending deletion state to maintain the security and integrity of sensitive healthcare data.

Potential Impact:

Allowing KMS keys to remain in a pending deletion state can have the following impacts:

  1. 1.
    Security Risk: Pending deletion keys may still be accessible, posing a potential security risk if unauthorized individuals gain access to the key.
  2. 2.
    Compliance Violation: HIPAA compliance standards require the secure management of encryption keys, including proper deletion procedures.

Troubleshooting Steps:

  1. 1.
    Identify KMS Keys: Review the list of KMS keys associated with your AWS account to identify any keys in the pending deletion state. This can be done using the AWS Management Console or AWS CLI.
  2. 2.
    Verify Status: Check the status of each identified KMS key to confirm if it is in the pending deletion state.
  3. 3.
    Determine Reason: Determine why the key is in the pending deletion state. It may have been manually scheduled for deletion or could be the result of an automated process.
  4. 4.
    Review Key Usage: Analyze the usage of the key to ensure that it is safe to proceed with deletion. Ensure that no critical systems or applications depend on the key for encryption or decryption.
  5. 5.
    Determine Authorized Individuals: Verify if there are any authorized individuals who need access to the key. Ensure that appropriate access control is in place.
  6. 6.
    Remediation: Take the necessary steps to remove the pending deletion status from the identified KMS key.

Remediation Steps:

To remediate the issue and remove the pending deletion status from a KMS key, follow these steps:

  1. 1.
    Open the AWS Management Console or use AWS CLI to access the AWS KMS service.
  2. 2.
    Navigate to the "Keys" section.
  3. 3.
    Locate the KMS key that is in the pending deletion state.
  4. 4.
    If the key is scheduled for deletion in less than 30 days, it cannot be recovered. Verify the scheduled deletion date.
  5. 5.
    If the key should not be deleted, select the key and click on "Cancel Key Deletion" in the console or use the
    cancel-key-deletion
    command in AWS CLI.
  6. 6.
    Confirm the cancellation of key deletion when prompted.
  7. 7.
    Verify that the key's status has changed from pending deletion to enabled.

Note:

It is important to understand the implications before canceling key deletion. Ensure that the key is no longer needed for any critical operations and that it does not violate any compliance requirements.

Conclusion:

By following the provided troubleshooting and remediation steps, the issue of having KMS keys in the pending deletion state can be addressed. Keeping KMS keys in an appropriate status contributes to the overall security and compliance of healthcare data protected under HIPAA regulations.

Is your System Free of Underlying Vulnerabilities?
Find Out Now