Config rule for encrypted volumes disabled
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Id: abdb29d4-5ca1-4e91-800b-b3569bbd788c
Cloud Provider: AWS
Platform: Terraform
Severity: High
Category: Encryption
Learn More
Description
This check verifies if AWS Config rules include the ENCRYPTED_VOLUMES source identifier, which monitors whether EBS volumes that are attached to EC2 instances are encrypted. Without this rule in place, organizations may unknowingly deploy unencrypted EBS volumes, potentially exposing sensitive data to unauthorized access in case of data breaches or improper access controls.
To address this vulnerability, ensure at least one AWS Config rule uses ENCRYPTED_VOLUMES as the source identifier, as shown below:
resource "aws_config_config_rule" "encrypted_volumes" {
name = "encrypted_vols_rule"
source {
owner = "AWS"
source_identifier = "ENCRYPTED_VOLUMES"
}
}
Compliant Code Examples
resource "aws_config_config_rule" "negative1" {
name = "encrypted_vols_rule"
source {
owner = "AWS"
source_identifier = "ENCRYPTED_VOLUMES"
}
}
resource "aws_config_config_rule" "negative2" {
name = "another_rule"
source {
owner = "AWS"
source_identifier = "IAM_PASSWORD_POLICY"
}
}
Non-Compliant Code Examples
resource "aws_config_config_rule" "positive1" {
name = "some_rule"
source {
owner = "AWS"
source_identifier = "IAM_PASSWORD_POLICY"
}
}
resource "aws_config_config_rule" "positive2" {
name = "another_rule"
source {
owner = "AWS"
source_identifier = "IAM_PASSWORD_POLICY"
}
}