Fix CRLY.01072: Encrypt RDS data at rest #39
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Issue Details
ID: CRLY.01072
Severity: HIGH
File: cfn/cfn-nipap-backend.json
Remediation Summary
Description
The security finding indicates that the data stored in the RDS instance is not securely encrypted at rest. This poses a risk as unencrypted data can be accessed by unauthorized users if the storage medium is compromised.
Steps
To remediate this issue, you need to add the
KmsKeyIdproperty to thePropertiessection of theRdsNipapDbresource in your CloudFormation template. This property specifies the KMS key that RDS will use to encrypt the data at rest.Here's how you can update your CloudFormation template programmatically:
Identify the KMS Key ARN: Ensure you have the ARN of the KMS key you want to use for encryption. You can create a KMS key using the AWS CLI or SDK if you don't already have one.
Update the CloudFormation Template: Add the
KmsKeyIdproperty under thePropertiessection of theRdsNipapDbresource.Here is an example of how to update the CloudFormation template:
Replace
arn:aws:kms:us-west-2:123456789012:key/abcd1234-a123-456a-a12b-a123b4cd56efwith the actual ARN of your KMS key.By following these steps, you will ensure that all data stored in the RDS instance is securely encrypted at rest.