Ensure that your AWS DocumentDB clusters data is encrypted with KMS Customer Master Keys (CMKs) instead of AWS managed-keys (default keys used by the DocumentDB service when there are no customer-managed keys defined) in order to have a more granular control over DocumentDB data-at-rest encryption and decryption.
This rule can help you with the following compliance standards:
This rule can help you work with the AWS Well-Architected Framework
This rule resolution is part of the Cloud Conformity Security & Compliance tool for AWS
When you use your own AWS KMS Customer Master Keys (CMKs) to protect your DocumentDB data (including indexes, logs, replicas and snapshots) from unauthorized users, you have full control over who can use the encryption keys to access your data. Amazon KMS service allows you to easily create, rotate, disable and audit Customer Master Keys created for your Amazon DocumentDB clusters.
To determine the encryption status and configuration for your AWS DocumentDB clusters, perform the following actions:
To encrypt an existing Amazon DocumentDB cluster with your own AWS KMS Customer Master Key (CMK), perform the following actions: