rspec/rules/S6303/description.adoc

17 lines
712 B
Plaintext
Raw Normal View History

Using unencrypted RDS DB resources exposes data to unauthorized access. +
This includes database data, logs, automatic backups, read replicas, snapshots,
and cluster metadata.
This situation can occur in a variety of scenarios, such as:
* A malicious insider working at the cloud provider gains physical access to the storage device.
* Unknown attackers penetrate the cloud provider's logical infrastructure and systems.
After a successful intrusion, the underlying applications are exposed to:
* theft of intellectual property and/or personal data
* extortion
* denial of services and security bypasses via data corruption or deletion
AWS-managed encryption at rest reduces this risk with a simple switch.