More Info:

This rule checks if Amazon Elastic Kubernetes Service (EKS) clusters are configured to have Kubernetes secrets encrypted using AWS Key Management Service (KMS) keys. It is marked as COMPLIANT if an EKS cluster has an encryptionConfig with secrets as one of the resources. It is also marked as COMPLIANT if the key used to encrypt EKS secrets matches with the parameter. It is marked as NON_COMPLIANT if an EKS cluster does not have an encryptionConfig or if the encryptionConfig resources do not include secrets. Additionally, it is marked as NON_COMPLIANT if the key used to encrypt EKS secrets does not match with the parameter.

Risk Level

Medium

Address

Security

Compliance Standards

CISEKS,SEBI

Triage and Remediation

Remediation

To remediate the misconfiguration of EKS clusters encryption of secrets not being enabled in AWS Kubernetes using the AWS console, you can follow these step-by-step instructions:

  1. Sign in to the AWS Management Console: Go to the AWS Management Console at https://aws.amazon.com/ and sign in using your credentials.

  2. Navigate to Amazon EKS service: In the AWS Management Console, search for “EKS” in the search bar or navigate to the “Services” dropdown menu and select “Elastic Kubernetes Service”.

  3. Select your EKS cluster: From the list of available EKS clusters, select the cluster for which you want to enable encryption of secrets.

  4. Click on the cluster name: Click on the name of the EKS cluster to access the cluster details and configuration.

  5. Navigate to Cluster Settings: In the cluster details page, navigate to the “Configuration” tab or “Cluster Settings” section.

  6. Edit Encryption Configuration: Look for the encryption configuration settings or secrets encryption settings. Click on the “Edit” button or similar option to edit the encryption configuration.

  7. Enable Encryption of Secrets: In the encryption configuration settings, enable the option for encryption of secrets. This setting ensures that all secrets stored in the EKS cluster are encrypted at rest.

  8. Save Changes: Once you have enabled encryption of secrets, make sure to save the changes by clicking on the “Save” or “Update” button.

  9. Verify Encryption Configuration: After saving the changes, verify that encryption of secrets is now enabled for the EKS cluster. You can check the encryption status in the cluster details or configuration settings.

  10. Monitor Encryption Status: Keep an eye on the encryption status regularly to ensure that secrets are always encrypted at rest in the EKS cluster.

By following these steps, you will successfully remediate the misconfiguration of EKS clusters encryption of secrets not being enabled in AWS Kubernetes using the AWS console.