This product is not supported for your selected Datadog site. ().

Metadata

Id: 25d251f3-f348-4f95-845c-1090e41a615c

Cloud Provider: aws

Framework: Terraform

Severity: Low

Category: Encryption

Learn More

Description

This check ensures that Amazon Elastic File System (EFS) resources are configured with encryption enabled using a customer-managed KMS key specified via the kms_key_id attribute, rather than defaulting to AWS-managed keys. If only encrypted = true is set without specifying a kms_key_id, sensitive data stored in EFS will use default AWS-managed encryption keys, reducing control over key rotation and access management. Failure to use a customer-managed key increases the risk of unauthorized data access and may not meet stringent compliance requirements for sensitive workloads.

Compliant Code Examples

resource "aws_efs_file_system" "negative1" {
  creation_token = "my-product"
  encrypted = true
  kms_key_id = "1234abcd-12ab-34cd-56ef-1234567890ab"

  tags = {
    Name = "MyProduct"
  }
}

Non-Compliant Code Examples

resource "aws_efs_file_system" "positive1" {
  creation_token = "my-product"
  encrypted = true

  tags = {
    Name = "MyProduct"
  }
}