
Summary
This detection rule identifies instances in which the default encryption for Amazon Elastic Block Store (EBS) is disabled within the specified AWS region. Disabling EBS encryption poses a significant security risk as it allows unprotected data to be written to storage volumes. The rule monitors AWS CloudTrail logs for specific events that signal disabled encryption. By focusing on the event source and event name 'DisableEbsEncryptionByDefault', it effectively tracks any attempts to turn off this critical security feature. Disabling encryption does not affect existing volumes but can lead to vulnerabilities for new volumes if not closely managed. Thus, it's crucial for system administrators to apply this rule primarily to production accounts and remain vigilant about the implications of any changes to EBS encryption settings.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
Created: 2021-06-29