Skip to content

EBS default encryption is disabled

Description

This policy identifies AWS regions in which new EBS volumes are getting created without any encryption. Encrypting data at rest reduces unintentional exposure of data stored in EBS volumes. It is recommended to configure EBS volume at the regional level so that every new EBS volume created in that region will be enabled with encryption by using a provided encryption key.

Fix - Runtime

AWS Console

To enable encryption at region level by default, follow below URL:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default

Additional Information:
To detect existing EBS volumes that are not encrypted ; refer Saved Search:
AWS EBS volumes are not encrypted_RL
To detect existing EBS volumes that are not encrypted with CMK, refer Saved Search:
AWS EBS volume not encrypted using Customer Managed Key_RL

Fix - Buildtime

Terraform

  • Resource: aws_ebs_encryption_by_default
  • Argument: enabled

go aws_s3_bucket.test.tf resource "aws_ebs_encryption_by_default" "enabled" { + enabled = true }