Profile Applicability: Level 2


Description: 

AWS Key Management Service (KMS) allows customers to rotate the backing key which is key material stored within the KMS which is tied to the key ID of the Customer Created customer master key (CMK). It is the backing key that is used to perform cryptographic operations such as encryption and decryption. Automated key rotation currently retains all prior backing keys so that decryption of encrypted data can take place transparently. It is recommended that CMK key rotation be enabled. 


Rationale: 

Rotating encryption keys helps reduce the potential impact of a compromised key as data encrypted with a new key cannot be accessed with a previous key that may have been exposed 


Audit: 

Perform the following to determine if CloudTrail is configured to use SSE-KMS: Via the Management Console 

Via the Management Console: 

1. Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam. 

2. In the left navigation pane, choose Encryption Keys. 

3. Select a customer created master key (CMK) 

4. Under the Key Policy section, move down to Key Rotation. 

5. Ensure the Rotate this key every year checkbox is checked. 


Remediation:

Perform the following to Check CMKs: Via the Management Console 

1. Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam. 

2. In the left navigation pane, choose Encryption Keys . 

3. Select a customer created master key (CMK) 

4. Under the Key Policy section, move down to Key Rotation . 

5. Check the Rotate this key every year checkbox. 


Reference: 

1. https://aws.amazon.com/kms/pricing/ 

2. http://csrc.nist.gov/publications/nistpubs/800-57/sp800- 57_part1_rev3_general.pdf 

3. CCE-78920-6


CIS Controls:

6 Maintenance, Monitoring and Analysis of Audit Logs 

Maintenance, Monitoring and Analysis of Audit Logs