You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Need ability to filter on resource configurations which use AWS-managed CMK's. Use case is where customers with security sensitive (such as FSIs) workloads mandate the usage of Customer-Managed CMKs, thus need to detect resources which are configured to use AWS-Managed CMKs. (detecting AES256 and non-encrypted is already covered in bucket-encryption examples).
Design and implementation should factor in the need to support the same detection on EBS volumes, RDS instances, DynamoDB Tables, EFS. And eventually Redshift and Elasticache
The text was updated successfully, but these errors were encountered:
Need ability to filter on resource configurations which use AWS-managed CMK's. Use case is where customers with security sensitive (such as FSIs) workloads mandate the usage of Customer-Managed CMKs, thus need to detect resources which are configured to use AWS-Managed CMKs. (detecting AES256 and non-encrypted is already covered in bucket-encryption examples).
Potential syntax:
Design and implementation should factor in the need to support the same detection on EBS volumes, RDS instances, DynamoDB Tables, EFS. And eventually Redshift and Elasticache
The text was updated successfully, but these errors were encountered: