More Info:

Amazon SQS queues should enforce Server-Side Encryption (SSE) to protect the contents of their messages. This way contents of your messages will be unavailable to unauthorized or anonymous users.

Risk Level

High

Addresses

Security

Compliance Standards

HIPAA,ISO27001,HITRUST,NISTCSF,SEBI

Triage and Remediation

Remediation

To remediate the misconfiguration of an SQS Queue not enforcing server-side encryption in AWS using the AWS Management Console, follow these step-by-step instructions:

  1. Sign in to the AWS Management Console:

  2. Navigate to the Amazon SQS service:

    • From the AWS Management Console, search for “SQS” or find the “Simple Queue Service” under the “Messaging” section.
  3. Select the SQS Queue requiring encryption:

    • Click on the SQS Queue that needs to enforce server-side encryption.
  4. Configure Server-Side Encryption:

    • In the SQS Queue details page, click on the “Configure Queue” button.
  5. Enable Server-Side Encryption:

    • Under the “Server-side encryption” section, select the option to enable server-side encryption.
  6. Choose Encryption Key:

    • Choose the Customer Master Key (CMK) from AWS Key Management Service (KMS) that you want to use for encrypting the messages in the SQS Queue.
  7. Save Changes:

    • Click on the “Save Changes” button to apply the server-side encryption configuration to the SQS Queue.
  8. Verify Encryption Configuration:

    • To ensure that server-side encryption is enforced, you can check the SQS Queue settings to confirm that encryption is enabled.

By following these steps, you have successfully enforced server-side encryption for the SQS Queue in AWS using the AWS Management Console. This will help in securing the messages stored in the queue and ensure compliance with security best practices.