MemoryDB clusters should be encrypted with a customer-managed KMS key

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

Description

MemoryDB clusters should be encrypted using a customer-managed KMS key rather than the default AWS-owned key. Customer-managed keys provide full control over key rotation policies, access permissions via KMS key policies, and the ability to revoke or disable the key.

Remediation

Create a new MemoryDB cluster with a customer-managed KMS key specified. Existing clusters cannot have their encryption key changed after creation. For guidance, refer to Encryption at rest in MemoryDB.