3.8 Ensure rotation for customer created symmetric CMKs is enabled

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

AWS Key Management Service (KMS) allows customers to rotate the backing key which is key material stored within the KMS which is tied to the key ID of the Customer Created customer master key (CMK). It is the backing key that is used to perform cryptographic operations such as encryption and decryption. Automated key rotation currently retains all prior backing keys so that decryption of encrypted data can take place transparently. It is recommended that CMK key rotation be enabled for symmetric keys. Key rotation can not be enabled for any asymmetric CMK.

Rationale:

Rotating encryption keys helps reduce the potential impact of a compromised key as data encrypted with a new key cannot be accessed with a previous key that may have been exposed. Keys should be rotated every year, or upon event that would result in the compromise of that key.

Impact:

Creation, management, and storage of CMKs may require additional time from and administrator.

Solution

From Console:

Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam.

In the left navigation pane, choose Customer managed keys .

Select a customer managed CMK where Key spec = SYMMETRIC_DEFAULT

Underneath the 'General configuration' panel open the tab 'Key rotation'

Check the 'Automatically rotate this KMS key every year.' checkbox

From Command Line:

Run the following command to enable key rotation:

aws kms enable-key-rotation --key-id <kms_key_id>

See Also

https://workbench.cisecurity.org/files/4047

Item Details

References: CCE|CCE-78920-6, CSCv7|6, CSCv7|14.8

Plugin: amazon_aws

Control ID: f797ba45e72cf1f307002e3bd809fd3300dff4100f71a0ec1e7ebce3a334e20e