Skip to main content

Neptune storage should be encrypted at rest

SeverityExploitabilityProvidersCategories
HIGHHIGHAWSDATA, PERMISSION

Description

Amazon Neptune is a fast, reliable, fully-managed graph database service that makes it easy to build and run applications that work with highly connected datasets.

The storage should always be encrypted at rest to protect the data if accesses are compromised. It is recommended to use the keys managed by AWS Key Management Service (KMS) for encryption and decryption.

Impact

Potential data exposureVisible in logsUser interaction requiredPrivileges required
TrueFalseFalseTrue

Not encrypting storages at rest could lead to data leak in case of an attack.

Remediation guidelines

Since it is not possible to encrypt an existing unencrypted Neptune DB Instance, you will have to perform manual steps:

  1. Create a snapshot of the unencrypted DB cluster
  2. restore the snapshot to an encrypted DB cluster by providing a key (optionally a KMS key)

References

How can I help you ?