Control: 2.2.3 Ensure EBS volume snapshots are encrypted
Description
Elastic Compute Cloud (EC2) supports encryption at rest when using the Elastic Block Store (EBS) service.
Encrypting data at rest reduces the likelihood that it is unintentionally exposed and can nullify the impact of disclosure if the encryption remains unbroken.
Remediation
From Console:
- Login to the EC2 console using https://console.aws.amazon.com/ec2/.
- Under
Elastic Block Store, click
Snapshots`. - Select the snapshot you want to encrypt.
- Click on
Actions
selectCopy
.
Confirm `Snapshot ID`Set the `Destination Region`Update the `Description`Select the check box for `Encryption`
- Check the box for
Encrypt this snapshot
. - Set the
Master Key
. - Click on
Copy
. - Repeat steps 3-7 for the snapshots that need to be encrypted.
- Delete any of the unencrypted snapshots that are not longer needed.
Note EBS snapshot volume encryption is configured per snapshot.
From Command Line:
Using the snapshot ids gathered from the Audit section
- Run - copy-snapshot.
aws ec2 copy-snapshot --source-region <region> --source-snapshot-id <snap-id> --description "Name of the new snapshot" --encrypted
- This will copy the existing unencrypted snapshot and set it to encrypted The output will show the new SnapshotId.
- Run - describe-snapshot.
aws ec2 describe-snapshots --owner-ids <account id> --filterName=status,Values=completed --query "Snapshots[*].{ID:SnapshotId}"
Once the new Snapshot shows in the list confirm encryption is set
- Run - describe-snapshots
aws ec2 describe-snapshots --snapshot-id <snap-name> --query"Snapshots[*].{Encrypt:Encrypted}"
- Repeat steps 1-4 for the snapshots that need to be encrypted.
Delete snapshots that are no longer needed.
- Run - delete-snapshot
aws ec2 delete-snapshot --snapshot-id <snap-name>
- Repeat for all unencrypted snapshots that have been copied and encrypted.
Note: EBS snapshot volume encryption is configured per snapshot.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.cis_compute_service_v100_2_2_3
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.cis_compute_service_v100_2_2_3 --share
SQL
This control uses a named query:
ebs_snapshot_encryption_enabled