Data protection

EBS account-level default encryption is not enabled

Platform(s)
Compliance Frameworks
  • AWS CIS
  • ,
  • AWS Foundational Security Best Practices Controls
  • ,
  • Brazilian General Data Protection (LGPD)
  • ,
  • CCPA
  • ,
  • coppa
  • ,
  • CPRA
  • ,
  • Data Security Posture Management (DSPM) Best Practices
  • ,
  • GDPR
  • ,
  • HITRUST
  • ,
  • iso_27001_2022
  • ,
  • iso_27002_2022
  • ,
  • Mitre ATT&CK
  • ,
  • mpa
  • ,
  • New Zealand Information Security Manual
  • ,
  • NIST 800-171
  • ,
  • NIST 800-53
  • ,
  • PDPA
  • ,
  • pipeda

Description

Elastic Compute Cloud (EC2) supports account-level encryption for Elastic Block Store (EBS) service, which uses Key Management Service (KMS) keys. Disabled encryption requires you to build, secure and maintain your own key management infrastructure. You can encrypt volumes and snapshots manually only at creation time - it is impossible to encrypt an existing unencrypted volume or snapshot. While enabled by default, new EBS volumes and snapshot copies are encrypted at rest, which provides an additional layer of data protection.