More Info:
Ensure that your Amazon Secrets Manager secrets (i.e. database credentials, API keys, OAuth tokens, etc) are encrypted with Amazon KMS Customer Master Keys (CMKs) instead of default encryption keys that Secrets Manager service creates for you, in order to have a more granular control over secret data encryption and decryption process, and meet compliance requirements.Risk Level
HighAddress
SecurityCompliance Standards
GDPR, NIST, NISTCSF, PCIDSSRemediation
How to ensure secrets manager secrets are encrypted with CMKsUsing AWS Console
- Log in to the AWS Management Console using your AWS account credentials.
- Navigate to the AWS Secrets Manager service by selecting “Secrets Manager” from the services menu.
- In the Secrets Manager dashboard, click on “Secrets” in the left navigation pane. (In the Cloudanix Console, navigate to “Misconfig” page and look for Affected Assets for “Secret Manager Secrets Should Be Encrypted With CMKs” Policy.)
- Identify the secrets that are not encrypted with CMKs.
- Take note of the specific secret identifier(s) that need remediation.
- Select the checkbox next to the secret(s) you want to remediate.
- Above the list of secrets, click on the “Edit rotation” button.
- In the “Configure secret rotation” page, click on the “Edit secret” button.
- In the “Secret details” section, scroll down to the “Encryption” configuration.
- Select the option to “Use AWS Key Management Service (KMS) key” for encryption.
- Choose an appropriate CMK from the dropdown menu or create a new CMK if necessary.
- Click on the “Save” button to apply the encryption configuration.
- In the “Configure secret rotation” page, click on the “Next” button.
- Review and modify the rotation settings as needed and click on the “Next” button.
- Review the summary of the rotation configuration and click on the “Finish” button.
- Monitor the rotation process to ensure it is successfully completed for the remediated secrets.
- Repeat these steps for each secret that is not encrypted with CMKs until all secrets have been remediated.