This rule ensures that RDS DB snapshots are encrypted to maintain data security.
Rule | RDS DB snapshots should be encrypted at rest |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description:
RDS DB snapshots should be encrypted at rest in order to comply with the NIST 800-53 Revision 5 security control for protecting sensitive data. Encrypting DB snapshots ensures that the data at rest is secure and cannot be accessed without the appropriate decryption keys.
Troubleshooting Steps:
Necessary Codes:
To encrypt your RDS DB snapshots at rest, you need to modify the DB instance settings. The following AWS CLI command can be used to enable DB snapshot encryption:
aws rds modify-db-snapshot --db-snapshot-identifier <snapshot-identifier> --encrypted --kms-key-id <kms-key-id>
Step-by-Step Guide for Remediation:
Identify the RDS DB instance for which you want to enable encryption for DB snapshots.
Ensure that you have the necessary permissions to modify the DB instance settings and enable encryption.
Open the AWS Command Line Interface (CLI) or any other CLI tool that supports AWS SDK.
Run the following command to enable DB snapshot encryption:
aws rds modify-db-snapshot --db-snapshot-identifier <snapshot-identifier> --encrypted --kms-key-id <kms-key-id>
Replace
<snapshot-identifier>
with the identifier of your RDS DB snapshot that you want to encrypt, and <kms-key-id>
with the ID of the KMS key that you want to use for encryption.aws rds describe-db-snapshots --db-snapshot-identifier <snapshot-identifier>
Replace
<snapshot-identifier>
with the identifier of your RDS DB snapshot.Verify that the encryption status of the DB snapshot is now "Encrypted".
Repeat the above steps for any other RDS DB snapshots that need to be encrypted at rest.
By following these steps, you can ensure that your RDS DB snapshots comply with the NIST 800-53 Revision 5 security control for encryption at rest.