Other Articles
- EC2 Volume – Enable EBS Encryption
- EC2 Volume – Enable EBS Volume Backup
- EFS – Enable EFS Storage Backup
- EC2 Instance – Enable Deletion Protection
- EC2 Instance – Monitor CPU Utilization
- ECS Service – Monitor CPU Utilization
- ECS Service – Monitor Memory Utilization
- EC2 VPC – Ensure Flow Logs are Enabled
- S3 Bucket – Block S3 Bucket Public Access
- S3 Bucket – Enable S3 Bucket Versioning
- S3 Bucket – Enable S3 Bucket Encryption
- RDS DB Instance – Enable Auto Minor Version Upgrade
- RDS DB Instance – Block Public Access
- RDS DB Instance – Monitor Free Storage Space
- RDS DB Instance – Monitor CPU Utilization
- RDS DB Instance – Encryption of Storage
- RDS DB Instance – Enable Deletion Protection
- SQS Queue – Monitor Message Age
- SQS Queue – Monitor Message Visibility
- DynamoDB Table – Enable Table Encryption
- DynamoDB Table – Enable Table Point In Time Recovery
- DynamoDB Table – Enable Table Deletion Protection
- DynamoDB Table – Monitor Table Read Capacity
- DynamoDB Table – Monitor Table Write Capacity
- DynamoDB Table – Monitor Table Latency
- Enable User MFA
- Enforce Key Rotation
- Enforce Active Key Limit
- Disable Unused User Credentials
- Enforce Group Permission
- Enable CloudTrail
- Enable AWS Security Hub
- Enforce Password Length
- Prohibit Password Reuse
- Purge Expired Certificates
- Check Root Access Keys Existence
- Enable Root MFA
- Establish Support Role
- Encrypt CloudTrail Logs
- Enable GuardDuty
Enable Key Rotation
This check ensures that automatic key rotation is enabled for AWS KMS customer-managed keys (CMKs). Regular key rotation reduces the risk of compromised encryption keys and helps meet security best practices.
Check Details
- Resource: General
- Check: Enable key rotation
- Risk: Long-lived encryption keys increase exposure if compromised
Remediation via AWS Console
-
Sign in to the AWS Management Console and open the
AWS KMS console.
-
In the left navigation panel, click
Customer-managed keys.
-
Select a key with
Key spec = SYMMETRIC_DEFAULT
that does not have automatic rotation enabled.
-
Open Key material and rotations.
-
Click Edit and enable
Automatic key rotation.
- Click Save changes.
- Repeat these steps for all customer-managed CMKs that do not have automatic rotation enabled.
Remediation via AWS CLI
-
Log in to the AWS Management Console and click the
CloudShell icon (
>_) in the top-right corner.
-
Enable automatic key rotation for the KMS key:
aws kms enable-key-rotation --key-id <kms-key-id>
Replace <kms-key-id> with the actual KMS key ID or ARN.