Ensure that the data managed by your AWS Database Migration Service (DMS) replication instances is encrypted with KMS Customer Master Keys (CMKs) instead of AWS managed-keys (default keys used by the DMS service when there are no customer-managed keys defined) in order to have a more granular control over AWS DMS data-at-rest encryption and decryption process.
This rule can help you with the following compliance standards:
This rule can help you work with the AWS Well-Architected Framework
This rule resolution is part of the Cloud Conformity Security & Compliance tool for AWS
Amazon DMS encrypts the storage used by your replication instances and the endpoint connection information associated with these instances. When you use your own AWS KMS Customer Master Keys (CMKs) to protect your DMS data from unauthorized users, you have full control over who can use the encryption keys to access your data. AWS KMS service allows you to easily create, rotate, disable and audit Customer Master Keys created for your Amazon DMS replication instances.
To determine the encryption status and configuration for your AWS DMS replication instances, perform the following actions:
To encrypt an existing Amazon DMS replication instance with your own AWS KMS Customer Master Key (CMK) you have to re-create the instance with the right encryption configuration. To launch a new DMS replication instance and assign a KMS CMK to the newly created resource, perform the following actions: