Kinesis not encrypted with KMS
Ce produit n'est pas pris en charge par le
site Datadog que vous avez sélectionné. (
).
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Id: 862fe4bf-3eec-4767-a517-40f378886b88
Cloud Provider: AWS
Platform: Terraform
Severity: High
Category: Encryption
Learn More
Description
AWS Kinesis Streams contain potentially sensitive data that should be encrypted at rest using AWS KMS to enhance security. When Kinesis streams are not encrypted with KMS, data stored in them is vulnerable to unauthorized access if the underlying storage is compromised. To properly secure Kinesis streams, both the encryption_type must be set to KMS and a valid kms_key_id must be specified, as shown in the following example:
resource "aws_kinesis_stream" "secure_example" {
name = "terraform-kinesis-test"
// ... other configurations ...
encryption_type = "KMS"
kms_key_id = "alias/aws/kinesis"
}
Compliant Code Examples
resource "aws_kinesis_stream" "negative1" {
name = "terraform-kinesis-test"
shard_count = 1
retention_period = 48
shard_level_metrics = [
"IncomingBytes",
"OutgoingBytes",
]
tags = {
Environment = "test"
}
encryption_type = "KMS"
kms_key_id = "alias/aws/kinesis"
}
Non-Compliant Code Examples
resource "aws_kinesis_stream" "positive1" {
name = "terraform-kinesis-test"
shard_count = 1
retention_period = 48
shard_level_metrics = [
"IncomingBytes",
"OutgoingBytes",
]
tags = {
Environment = "test"
}
}
resource "aws_kinesis_stream" "positive2" {
name = "terraform-kinesis-test"
shard_count = 1
retention_period = 48
shard_level_metrics = [
"IncomingBytes",
"OutgoingBytes",
]
tags = {
Environment = "test"
}
encryption_type = "NONE"
}
resource "aws_kinesis_stream" "positive3" {
name = "terraform-kinesis-test"
shard_count = 1
retention_period = 48
shard_level_metrics = [
"IncomingBytes",
"OutgoingBytes",
]
tags = {
Environment = "test"
}
encryption_type = "KMS"
}