Skip to content

Latest commit

 

History

History
30 lines (26 loc) · 2.8 KB

kinesis-streams-encrypted.md

File metadata and controls

30 lines (26 loc) · 2.8 KB

CloudSploit

AWS / Kinesis / Kinesis Streams Encrypted

Quick Info

Plugin Title Kinesis Streams Encrypted
Cloud AWS
Category Kinesis
Description Ensures Kinesis Streams encryption is enabled
More Info Data sent to Kinesis Streams can be encrypted using KMS server-side encryption. Existing streams can be modified to add encryption with minimal overhead.
AWS Link https://docs.aws.amazon.com/streams/latest/dev/server-side-encryption.html
Recommended Action Enable encryption using KMS for all Kinesis Streams.

Detailed Remediation Steps

  1. Log in to the AWS Management Console.
  2. Select the "Services" option and search for "Kinesis".
  3. Under the "Amazon Kinesis dashboard" choose "Data Firehose" or "Delivery streams" from the left navigation panel.
  4. Select the "Firehose Delivery System" that needs to be verified and click on the "Name" to access the delivery stream.
  5. Select the "Configuration" tab and scroll down to "Amazon S3 destination". Click on the S3 bucket link to check the "Encryption" value.
  6. In the Amazon S3 bucket configuration tab that opens, select "Properties" tab.
  7. Scroll down to "Default encryption", and if it's set to "Disabled" then the selected "Firehose Delivery System" data is not encrypted.
  8. Click "Edit" and on the "Edit default encryption" page select "Enable".
  9. Under the "Encryption key type" select "AWS Key Management Service key (SSE-KMS)".
  10. In the "AWS KMS key" section select option "Choose from your AWS KMS keys" and in the "AWS KMS key" select your key from the dropdown.
  11. Select the "Enable" option under "Bucket Key" and click on "Save changes" to enable the encryption.
  12. On the successful configuration changes, one will get "Successfully edited default encryption" message.
  13. Repeat step number 4 and 12 to verify all other "Firehose Delivery System".