Ensure encryption is used for Kinesis

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Metadata

ID: terraform-aws/aws-kinesis-no-encryption

Language: Terraform

Severity: Warning

Category: Security

Description

This rule is designed to ensure that encryption is enabled for your AWS Kinesis data streams. Encryption in transit is a vital security measure that protects your data from unauthorized access as it moves from one location to another. Without it, your sensitive data could be exposed to potential threats.

The importance of this rule cannot be overstated. In today’s digital landscape, data breaches are increasingly common and can have significant impacts on your organization’s reputation and bottom line. Therefore, enabling encryption for your Kinesis data streams is a crucial step in safeguarding your data.

To avoid violating this rule, ensure that you specify the encryption_type attribute in your aws_kinesis_stream resource block and set it to KMS. This enables AWS Key Management Service (KMS) encryption for your data stream. An example of compliant code would be:

    encryption_type = "KMS"
}```. By adhering to this practice, you can keep your data secure and maintain compliance with this Terraform static analysis rule.

## Non-Compliant Code Examples
```terraform
resource "aws_kinesis_stream" "mystream" {   
}
resource "aws_kinesis_stream" "mystream" {
    encryption_type = "NONE"
}

Compliant Code Examples

resource "aws_kinesis_stream" "mystream" {
    encryption_type = "KMS"
}
https://static.datadoghq.com/static/images/logos/github_avatar.svg https://static.datadoghq.com/static/images/logos/vscode_avatar.svg jetbrains

Seamless integrations. Try Datadog Code Analysis

PREVIEWING: mcretzman/DOCS-9337-add-cloud-info-byoti