MemoryDB clusters should use KMS encryption

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Description

MemoryDB clusters should have encryption at rest enabled to protect cached data, backups, and snapshots from unauthorized access. AWS owned keys (the default), AWS managed KMS keys, and customer managed KMS keys are all acceptable. This rule verifies that encryption at rest is not explicitly disabled.

Remediation

Ensure encryption at rest is enabled for the cluster. AWS owned keys, AWS managed KMS keys, and customer managed KMS keys are all acceptable. For guidance, see Encrypting data at rest in MemoryDB.