Other Articles
- IAM - Enable User MFA
- IAM - Enforce Key Rotation
- IAM - Enforce Active Key Limit
- IAM - Disable Unused User Credentials
- IAM - Enforce Group Permission
- IAM - Enforce Password Length
- IAM - Prohibit Password Reuse
- IAM - Check Root Access Keys Existence
- IAM - Enable Root MFA
- IAM - Establish Support Role
- IAM - Enable Key Rotation
- Purge Expired Certificates
- EC2 Volume – Enable EBS Volume Backup
- EC2 Volume – Enable EBS Encryption
- S3 Bucket – Enable S3 Bucket Versioning
- S3 Bucket – Enable S3 Bucket Encryption
- S3 Bucket – Block S3 Bucket Public Access
- RDS DB Instance – Encryption of Storage
- RDS DB Instance – Enable Deletion Protection
- RDS DB Instance – Enable Auto Minor Version Upgrade
- DynamoDB Table – Enable Table Encryption
- DynamoDB Table – Enable Table Point In Time Recovery
- DynamoDB Table – Enable Table Deletion Protection
- EC2 Instance – Monitor CPU Utilization
- ECS Service – Monitor CPU Utilization
- ECS Service – Monitor Memory Utilization
- RDS DB Instance – Monitor Free Storage Space
- RDS DB Instance – Monitor CPU Utilization
- SQS Queue – Monitor Message Age
- SQS Queue – Monitor Message Visibility
- DynamoDB Table – Monitor Table Read Capacity
- DynamoDB Table – Monitor Table Write Capacity
- DynamoDB Table – Monitor Table Latency
- Enable CloudTrail
- Encrypt CloudTrail Logs
- EC2 VPC – Ensure Flow Logs are Enabled
- RDS DB Instance – Block Public Access
- EC2 Instance – Enable Deletion Protection
- ECS Service – Enable Auto Scaling
- Enable AWS Security Hub
- Enable GuardDuty
EFS – Enable EFS Storage Backup
Secure Configuration Checks > AWS
This check ensures that automatic backups are enabled for Amazon EFS file systems. Enabling backups helps protect data from accidental deletion, corruption, or unexpected failures.
Check Details
- Resource: EFS File System
- Check: Enable EFS storage backup
- Risk: Data loss due to missing or outdated backups
Remediation via AWS Console
-
Log in to the AWS Management Console and open the Amazon EFS console.
- Select the EFS file system where backup is not enabled and click Edit (top-right corner).
-
In the Automatic backups section, check Enable automatic backups.
- Click Save.
Remediation via AWS CLI
-
Log in to the AWS Management Console and click the CloudShell icon (
>_) in the top-right corner.
-
Identify the EFS file system ID:
aws efs describe-file-systems \ --query "FileSystems[*].FileSystemId" \ --output table
-
Enable automatic backups for the file system:
aws efs put-backup-policy \ --file-system-id <file-system-id> \ --backup-policy Status=ENABLED
-
Verify the backup configuration:
aws efs describe-file-systems \ --file-system-id <file-system-id> \ --query "FileSystems[*].BackupPolicy"
-
Confirm the output shows:
{ "Status": "ENABLED" }
Updated on 06 March, 2026