- 24 Aug 2023
- 1 Minute to read
- DarkLight
S3 bucket employs default encryption at-rest
- Updated on 24 Aug 2023
- 1 Minute to read
- DarkLight
Description
Amazon S3 provides a variety of no-cost or low-cost encryption options to protect data at rest.
Rationale
Encrypting data at rest reduces the likelihood that it is unintentionally exposed and can nullify the impact of disclosure if the encryption remains unbroken.
Remediation
From the console
- Login to AWS Management Console and open the Amazon S3 console using https://console.aws.amazon.com/s3/
- Select the Check box next to the Bucket.
- Click on Properties.
- Click on Default Encryption.
- Select either AES-256 or AWS-KMS.
- Click Save.
- Repeat for all the buckets in your AWS account lacking encryption.
From the command line
Run one of the following commands:
aws s3api put-bucket-encryption --bucket <bucket name> --server-side-encryption-configuration ''{"Rules": [{"ApplyServerSideEncryptionByDefault": {"SSEAlgorithm": "AES256"}}]}''
or:
aws s3api put-bucket-encryption --bucket <bucket name> --server-side-encryption-configuration ''{"Rules": [{"ApplyServerSideEncryptionByDefault": {"SSEAlgorithm": "aws:kms","KMSMasterKeyID": "aws/s3"}}]}''
Note: The KMSMasterKeyID
can be set to the master key of your choosing; aws/s3
is an AWS preconfigured default.
References
https://docs.aws.amazon.com/AmazonS3/latest/user-guide/default-bucket-encryption.html
https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-related-resources
Additional Information: S3 bucket encryption only applies to objects as they are placed in the bucket. Enabling S3 bucket encryption does not encrypt objects previously stored within the bucket.