Announcing Tami, Our New AI Cloud SecOps Agent Learn More

Automatically unencrypted EBS Volumes remediation using KMS keys

Description

This playbook describes how to remediate unencrypted EBS Volumes automatically. Amazon EBS encrypted volumes provide an additional layer of data protection by securing your data from unauthorized access to the underlying storage. You can use Amazon EBS encryption to increase the data protection of your applications deployed in the cloud and to fulfill compliance requirements for encryption at rest. In addition, this guide explains how KMS integrates with EBS encrypted workflows to ensure seamless key management across AWS environments. Amazon EBS combined with KMS helps enforce best security practices, ensuring encryption consistency and compliance.

Severity Level

Unencrypted EBS volumes pose a high-severity security risk. They can expose sensitive data if compromised. This playbook addresses this critical issue by using Amazon EBS encryption with KMS to ensure all AWS volumes are encrypted and compliant.

Playbook Steps

1. Deploy an automated process to trace unencrypted EBS and Automated remediation:

  1. Stop Instance
  2. Create a volume snapshot
  3. Encrypt Snapshot
  4. Detach unencrypted volume
  5. Attach new encrypted volume
  6. Restart Instance

2. Enable EBS encryption as default for all accounts.

3. Add SCP Deny policy for creation of an instance with unencrypted EBS.

Prerequisites

Notes

Automation Stack Limitations

Deployment

Usage

Auto Scaling Group Remediation

1. Enable encryption by default.
2. Suspend Health Check in Auto Scaling Group.
3. Execute remediation.
4. Re-enable Health Check.

Enforce Service Control Policies

Enable Default EBS Encryption

Frequently Asked Questions

What are the benefits of using Amazon EBS encrypted volumes with KMS?

Amazon EBS encrypted volumes with KMS provide secure data at rest, prevent unauthorized access, and simplify key management in AWS. This ensures compliance and consistent protection.

AWS Config continuously monitors resources and uses rules like encrypted-volumes to detect non-compliant, unencrypted volumes. This enables automated remediation for Amazon EBS resources.

Yes, you can use a pre-existing KMS key. Update the key policy to include the remediation role so EBS encrypted volumes can be created seamlessly.

For Auto Scaling Groups, suspend the health check process, execute the remediation, and then re-enable checks. This ensures encrypted Amazon EBS volumes are deployed correctly.

EBS encryption is region-specific. You must enable default encryption separately for each AWS region to ensure all Amazon EBS volumes are encrypted.

It creates a snapshot, encrypts it, detaches the unencrypted volume, and attaches the new EBS encrypted volume using AWS KMS for secure storage.

 

IAM roles must allow access to CloudFormation, EC2, Systems Manager, Config, and KMS in AWS to manage Amazon EBS encrypted volumes.

Yes, it integrates with AWS Config and KMS policies, aligning Amazon EBS encryption with broader security compliance frameworks and automation workflows.

Learn More About Tamnoon’s Managed Cloud Security

Learn More About Tamnoon’s Managed Service

Scroll to Top