MemoryDB clusters should be encrypted with a customer-managed KMS key

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Description

MemoryDB clusters should be encrypted using a customer-managed KMS key rather than the default AWS-owned key. Customer-managed keys provide full control over key rotation policies, access permissions via KMS key policies, and the ability to revoke or disable the key.

Remediation

Create a new MemoryDB cluster with a customer-managed KMS key specified. Existing clusters cannot have their encryption key changed after creation. For guidance, refer to Encryption at rest in MemoryDB.