KMS Policies¶
2 policies covering key management.
| ID | Name | Severity | Frameworks |
|---|---|---|---|
| KMS-001 | KMS Key Rotation Enabled | HIGH | HIPAA, PCI DSS, ISO 27001, SOC 2 |
| KMS-002 | KMS Key Deletion Window | MEDIUM | ISO 27001, SOC 2 |
KMS-001¶
KMS Key Rotation Enabled | HIGH
Frameworks: HIPAA, PCI DSS, ISO 27001, SOC 2
KMS key must have automatic key rotation enabled. Automatic annual rotation of KMS keys reduces the risk of key compromise by limiting the amount of data encrypted under a single key version and satisfying regulatory requirements for cryptographic key lifecycle management.
Remediation:
Resource type: aws_kms_key
KMS-002¶
KMS Key Deletion Window | MEDIUM
Frameworks: ISO 27001, SOC 2
KMS key has deletion window less than 14 days. A short deletion window increases the risk of accidental permanent key loss. Setting a minimum of 14 days provides adequate time to detect and cancel unintended key deletions before encrypted data becomes permanently inaccessible.
Remediation:
Resource type: aws_kms_key