AWS Amazon EC2 Encryption By Default
This page shows how to write Terraform for Amazon EC2 Encryption By Default and write them securely.
aws_ebs_encryption_by_default (Terraform)
The Encryption By Default in Amazon EC2 can be configured in Terraform with the resource name aws_ebs_encryption_by_default
. The following sections describe 5 examples of how to use the resource and its parameters.
Example Usage from GitHub
resource "aws_ebs_encryption_by_default" "enabled" {
enabled = true
}
resource "aws_ebs_encryption_by_default" "default" {
}
resource "aws_ebs_encryption_by_default" "enabled" {
enabled = true
}
resource "aws_ebs_encryption_by_default" "default" {
}
resource "aws_ebs_encryption_by_default" "default_encryption" {
enabled = false # Noncompliant
# ^^^^^
}
resource "aws_ebs_encryption_by_default" "default_encryption_1" { # Compliant
}
resource "aws_ebs_encryption_by_default" "enabled" {
enabled = true
}
resource "aws_ebs_encryption_by_default" "default" {
}
resource "aws_ebs_encryption_by_default" "negative1" {
enabled = true
}
resource "aws_ebs_encryption_by_default" "negative2" {
Parameters
Explanation in Terraform Registry
Provides a resource to manage whether default EBS encryption is enabled for your AWS account in the current AWS region. To manage the default KMS key for the region, see the
aws_ebs_default_kms_key
resource.NOTE: Removing this Terraform resource disables default EBS encryption.
Tips: Best Practices for The Other AWS Amazon EC2 Resources
In addition to the aws_default_vpc, AWS Amazon EC2 has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
aws_default_vpc
Ensure to avoid using default VPC
It is better to define the own VPC and use it.
aws_network_acl_rule
Ensure your network ACL rule blocks unwanted inbound traffic
It is better to block unwanted inbound traffic.
aws_ebs_volume
Ensure to use a customer-managed key for EBS volume encryption
It is better to use a customer-managed key for EBS volume encryption. It can be gain more control over the encryption by using customer-managed keys (CMK).
aws_instance
Ensure to avoid storing AWS access keys in user data
It is better to avoid storing AWS access keys in user data. `aws_iam_instance_profile` could be used instead.
aws_security_group
Ensure your security group blocks unwanted inbound traffic
It is better to block unwanted inbound traffic.
CloudFormation Example
CloudFormation code does not have the related resource.
Frequently asked questions
What is AWS Amazon EC2 Encryption By Default?
AWS Amazon EC2 Encryption By Default is a resource for Amazon EC2 of Amazon Web Service. Settings can be wrote in Terraform.
Where can I find the example code for the AWS Amazon EC2 Encryption By Default?
For Terraform, the sprathod369/iac-example, SnidermanIndustries/checkov-fork and SonarSource/sonar-iac source code examples are useful. See the Terraform Example section for further details.