lacework-global-78
3.8 Ensure rotation for customer created CMKs is enabled (Automated)
Profile Applicability
• Level 2
Description
AWS Key Management Service (KMS) allows customers to rotate the backing key which is key material stored within the KMS which is tied to the key ID of the Customer Created customer master key (CMK). It is the backing key that is used to perform cryptographic operations such as encryption and decryption. Automated key rotation currently retains all prior backing keys so that decryption of encrypted data can take place transparently. It is recommended that CMK key rotation be enabled.
Rationale
Rotating encryption keys helps reduce the potential impact of a compromised key as data encrypted with a new key cannot be accessed with a previous key that may have been exposed.
Audit
From Console
- Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam.
- In the left navigation pane, choose
Encryption Keys
. - Select a customer created master key (CMK)
- Under the
Key Policy
section, move down toKey Rotation
. - Ensure the
Rotate this key every year
checkbox is checked.
From Command Line
- Run the following command to get a list of all keys and their associated
KeyIds
aws kms list-keys
- For each key, note the KeyId and run the following command
aws kms get-key-rotation-status --key-id <kms_key_id>
- Ensure
KeyRotationEnabled
is set totrue
Remediation
From Console
- Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam.
- In the left navigation pane, choose
Encryption Keys
. - Select a customer created master key (CMK)
- Under the
Key Policy
section, move down toKey Rotation
. - Check the
Rotate this key every year
checkbox.
From Command Line
- Run the following command to enable key rotation:
aws kms enable-key-rotation --key-id <kms_key_id>
References
CCE-78920-6
https://aws.amazon.com/kms/pricing/
https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final