Checks if the S3 buckets are encrypted with AWS Key Management Service (AWS KMS). The rule is NON_COMPLIANT if the S3 bucket is not encrypted with an AWS KMS key.
Identifier: S3_DEFAULT_ENCRYPTION_KMS
Resource Types: AWS::S3::Bucket, AWS::KMS::Key
Trigger type: Configuration changes
AWS Region: All supported AWS regions except Asia Pacific (Taipei) Region
Parameters:
Comma separated list of AWS KMS key ARNs allowed for encrypting Amazon S3 Buckets.
To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.
s3-bucket-versioning-enabled
s3-event-notifications-enabled
Did this page help you? - Yes
Thanks for letting us know we're doing a good job!
If you've got a moment, please tell us what we did right so we can do more of it.
Did this page help you? - No
Thanks for letting us know this page needs work. We're sorry we let you down.
If you've got a moment, please tell us how we can make the documentation better.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4