More Info:

Your RDS database instances should be using KMS CMK customer-managed keys rather than AWS managed-keys in order to have more granular control over your data-at-rest encryption/decryption process.

Risk Level

Medium

Address

Security

Compliance Standards

GDPR, NIST, AWSWAF, HITRUST, SOC2, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

To remediate the misconfiguration of using AWS-managed keys instead of Customer-Managed Keys for AWS RDS using the AWS console, follow these steps:

  1. Create a Customer-Managed Key (CMK):

    • Go to the AWS Key Management Service (KMS) console.
    • Click on “Create key” to create a new CMK.
    • Choose the key creation method (Symmetric key or Asymmetric key) based on your requirements.
    • Define key administrative permissions and key usage permissions.
    • Click on “Finish” to create the CMK.
  2. Update the RDS Instance to use the Customer-Managed Key:

    • Go to the Amazon RDS console.
    • Select the RDS instance for which you want to update the encryption key.
    • Click on “Modify” to modify the instance settings.
    • In the “Encryption” section, choose the option to encrypt using a Customer-Managed Key.
    • Select the Customer-Managed Key (CMK) that you created in step 1.
    • Click on “Continue” and review the changes.
    • Click on “Modify DB Instance” to apply the changes.
  3. Monitor the Encryption Key Update:

    • Once you have modified the RDS instance to use the Customer-Managed Key, monitor the instance to ensure that the encryption key update is successful.
    • Check the RDS instance status and logs for any errors related to the encryption key update.
    • Verify that the RDS instance is using the Customer-Managed Key for encryption.

By following these steps, you can remediate the misconfiguration of using AWS-managed keys instead of Customer-Managed Keys for AWS RDS using the AWS console.

Additional Reading: