EBS Default Encryption Disabled
Overview
Elastic Compute Cloud (EC2) supports encryption at rest when using the Elastic Block Store (EBS) service. While each EBS volume's encryption can be configured individually, there is also a per-region setting to always encrypt new EBS volumes. This setting is disabled by default, but it is recommended that it be enabled.
Rationale:
Encrypted volumes create encrypted snapshots, which prevents public sharing of snapshots without also sharing the encryption key. Encrypting data at rest reduces the likelihood that it is unintentionally exposed and can nullify the impact of disclosure if the encryption remains unbroken. Encrypted EBS volumes provide encryption for data not only at rest, but also in transit between AWS components.
Impact: Losing access or removing the KMS key in use by the EBS volumes will result in no longer being able to access the volumes.
Vendor
AWS
Cloud Service
EC2
Related Controls
CIS AWS v1.5.0 2.2.1, CSMM v1 DAT-02.2, EC2.7
References
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html, https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_EnableEbsEncryptionByDefault.html, https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ebs_encryption_by_default, https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/enable-ebs-encryption-by-default.html
Severity
2
Item Types
Custom::AWS::Region