This product is not supported for your selected
Datadog site. (
).
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Id: 254c932d-e3bf-44b2-bc9d-eb5fdb09f8d4
Cloud Provider: aws
Framework: Terraform
Severity: High
Category: Encryption
Learn More
Description
This check ensures that AWS ElastiCache Redis clusters are using versions that comply with PCI DSS requirements. Older Redis versions (prior to 5.0.0) lack important security features such as encryption in transit, improved authentication, and vulnerability patches required for PCI DSS compliance. Using non-compliant Redis versions could lead to data breaches, non-compliance penalties, and compromise of sensitive information stored in the cache.
Non-compliant example:
resource "aws_elasticache_cluster" "example" {
cluster_id = "cluster-example"
engine = "redis"
engine_version = "2.6.13" // Non-compliant version
// ... other configuration
}
Compliant example:
resource "aws_elasticache_cluster" "example" {
cluster_id = "cluster-example"
engine = "redis"
engine_version = "5.0.0" // Compliant version
// ... other configuration
}
Compliant Code Examples
#this code is a correct code for which the query should not find any result
resource "aws_elasticache_cluster" "negative1" {
cluster_id = "cluster-example"
engine = "redis"
node_type = "cache.m4.large"
num_cache_nodes = 1
engine_version = "5.0.0"
port = 6379
}
Non-Compliant Code Examples
#this is a problematic code where the query should report a result(s)
resource "aws_elasticache_cluster" "positive1" {
cluster_id = "cluster-example"
engine = "redis"
node_type = "cache.m4.large"
num_cache_nodes = 1
engine_version = "2.6.13"
port = 6379
}