More Info:
Ensure that your AWS ElastiCache Redis clusters are encrypted in order to meet security and compliance requirements (keep Personally Identifiable Information safe). Data encryption helps prevent unauthorized users from reading sensitive data available on your Redis clusters and their associated cache storage systems. This includes data saved to persistent media, known as data at-rest, and data that can be intercepted as it travels through the network, between clients and cache servers, known as data in-transit.Risk Level
HighAddress
SecurityCompliance Standards
HIPAA,GDPR,NIST,SOC2,NISTCSF,PICDSSRemediation
How to encrypt elastic cache at rest and in transit.Using AWS Console
Encrypting ElastiCache at Rest:- Log in to the AWS Management Console using your AWS account credentials.
- Navigate to the ElastiCache service by selecting “ElastiCache” from the services menu.
- In the ElastiCache dashboard, select the cache cluster for which you want to enable encryption. (In the Cloudanix Console, navigate to “Misconfig” page and look for Affected Assets for “Elasticcache should be encrypted at rest and in transit” Policy.)
- Click on the “Actions” button and select “Modify” from the dropdown menu.
- In the Modify cluster settings page, scroll down to the “Encryption at Rest” section.
- Choose the encryption option that suits your requirements. You have two options:
- AWS Managed Keys (AWS KMS): Select “Enable” and choose the appropriate AWS Key Management Service (KMS) key from the dropdown menu.
- Customer Managed Keys (CMKs): Select “Enable” and provide the ARN of the customer managed key you want to use.
- Review the other configuration settings as needed and click on the “Modify” button.
- AWS will apply the encryption changes to the ElastiCache cluster, which may take a few minutes to complete.
- Once the encryption is successfully applied, your ElastiCache data will be encrypted at rest.
- Ensure that your ElastiCache cluster is deployed in a Virtual Private Cloud (VPC). If not, create a VPC and deploy your ElastiCache cluster within it.
- In the AWS Management Console, navigate to the VPC service by selecting “VPC” from the services menu.
- In the VPC dashboard, select “Security Groups” from the left navigation pane.
- Locate the security group associated with your ElastiCache cluster.
- Click on the security group, and in the “Inbound Rules” tab, add a new rule to allow incoming traffic on the desired port(s) for ElastiCache (e.g., port 6379 for Redis).
- Ensure that the source IP or CIDR range specified in the rule is limited to the trusted clients or applications that need access to the ElastiCache cluster.
- Click on “Save Rules” to apply the security group changes.
- By allowing access only from trusted sources, you ensure that the traffic to and from your ElastiCache cluster is encrypted in transit.