More Info:

AWS S3 buckets should be configured to use Server-Side Encryption with customer managed CMKs instead of S3-Managed Keys (SSE-S3) in order to obtain a fine-grained control over Amazon S3 data-at-rest encryption and decryption process.

Risk Level

Low

Address

Security

Compliance Standards

NIST, AWSWAF, HITRUST, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate the misconfiguration of S3 Buckets not being encrypted with Customer-Provided CMKs in AWS, follow these step-by-step instructions:

  1. Log in to the AWS Management Console.
  2. Go to the S3 service.
  3. Select the bucket that needs to be encrypted with a Customer-Provided CMK.
  4. Click on the “Properties” tab.
  5. Scroll down to the “Default encryption” section and click on “Edit”.
  6. Select “AWS-KMS” as the encryption type.
  7. Choose “Customer managed CMK” for the master key.
  8. Select the CMK that you want to use for encryption from the drop-down menu.
  9. Click on “Save changes”.

Once you have completed these steps, all objects in the selected S3 bucket will be encrypted with the Customer-Provided CMK that you have chosen. It is important to note that you will need to ensure that the appropriate IAM policies are in place to allow access to the CMK for the appropriate users or roles.

Additional Reading: