MemoryDB clusters should use KMS encryption
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Description
MemoryDB clusters should have encryption at rest enabled to protect cached data, backups, and snapshots from unauthorized access. AWS owned keys (the default), AWS managed KMS keys, and customer managed KMS keys are all acceptable. This rule verifies that encryption at rest is not explicitly disabled.
Ensure encryption at rest is enabled for the cluster. AWS owned keys, AWS managed KMS keys, and customer managed KMS keys are all acceptable. For guidance, see Encrypting data at rest in MemoryDB.