Are my AWS Resources Encrypted or Unencrypted by Default?

July 16, 2024
Jason Kao

Secure By Default: Are my AWS Resources Encrypted or Unencrypted by Default?

This is the accompanying blog post to our GitHub release: Encrypted by Default in AWS Tracker: If you have feedback or questions, direct them to info@fogsecurity.io, we'd love to hear from you.

A security trend that's picked up more traction in cloud recently is the concept of "secure by default".  This is covered by such features such as Block Public Access by default (Remember S3 Buckets and the change AWS made in 2018) to the introduction of encrypted objects in S3 by default in 2023. Encryption can be crucial part of a data protection strategy and is often required by compliance frameworks. In cloud, encryption is offered by cloud providers and in AWS can be done by services such as KMS (Key Management Service) and CloudHSM.

That brings us to the question about encryption and security by default in cloud: Are my AWS resources encrypted or unencrypted by default?

We researched 43 AWS services that support encryption and tested 51 different types of resources including compute, database, storage, AI and machine learning, management and governance. These include EC2, Sagemaker, DynamoDB, S3, Secrets Manager, CloudWatch, RDS, and more.

Quick Statistics of Encryption by Default (as of July 2024)

Not only did we find varying states of encryption by default, we also found different encryption mechanisms including encrypted by default with AWS Owned Keys and encrypted by default with AWS Managed KMS Keys. For more information about AWS Managed KMS Keys, see our latest research here.

In this post, we'll cover:

Impact

GitHub Repository: https://github.com/FogSecurity/aws-default-encryption-tracker

GitHub Link: Encrypted by Default in AWS

Encryption in AWS

Symmetric encryption in AWS Options include:

Table from AWS KMS Documentation for types of KMS Keys

Encryption Recommendations

Ensure Encryption by Default

Wishlist for AWS

Our wishlist for AWS includes the following changes to improve security and compliance by default:

Research Methodology

To validate AWS resources and encryption, the following methods and process were used:

Note: Encryption results may be misleading.  See our Quantum Ledger Database (QLDB) research here for an example of misleading reporting on encryption status.

GitHub Repository: https://github.com/FogSecurity/aws-default-encryption-tracker

If you want to chat cloud data security or want help with encryption management and data security, email us at info@fogsecurity.io, we'd love to hear from you. We're passionate about cloud data security and are building tools to help teams with identifying those unencrypted resources and best securing data in your AWS-based workloads and infrastructure. More research and resources related to encryption and data perimeters to come!

Subscribe to stay up to date on cloud data security and our work.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.