MemoryDB clusters should use KMS encryption
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Description
MemoryDB clusters should have encryption at rest enabled to protect cached data, backups, and snapshots from unauthorized access. AWS owned keys (the default), AWS managed KMS keys, and customer managed KMS keys are all acceptable. This rule verifies that encryption at rest is not explicitly disabled.
Ensure encryption at rest is enabled for the cluster. AWS owned keys, AWS managed KMS keys, and customer managed KMS keys are all acceptable. For guidance, see Encrypting data at rest in MemoryDB.