Cyber Posture

Controls

What cloud configurations do I need to worry about to implement encryption at rest?

This page maps high-level controls (NIST 800-53 r5, proprietary framework, more later) to the specific cloud-platform configurations that satisfy them. Future expansion: live findings from CSPM tools, CVE coverage reverse-lookup, and threat-technique mitigation paths.

Catalogue summary

2
Frameworks
49
Implementations
17
Cloud platforms (encryption at rest)
FrameworkRowsComposition
NIST_800-53_r51,216control (324), family (20), enhancement (872)
Proprietary_25_Family324family (25), control (97), subcontrol (202)

Encryption at rest — required cloud configurations

The implementations below all satisfy NIST 800-53 r5 SC-28 (Protection of Information at Rest). Pick the platforms relevant to your stack; each row is a specific check you need to keep green.

PlatformConfigurationImplementation ID
AWS::DynamoDB::TableDynamoDB table uses encryption at rest with KMSaws-config-dynamodb-table-encryption-enabled
AWS::EC2::VolumeEBS encryption by default is enabledaws-config-ec2-ebs-encryption-by-default
AWS::EC2::VolumeEBS volumes are encrypted at restaws-config-encrypted-volumes
AWS::EFS::FileSystemEFS file system is encryptedaws-config-efs-encrypted-check
AWS::EKS::ClusterEKS cluster encrypts Kubernetes secrets at rest with KMSaws-config-eks-cluster-secrets-encrypted
AWS::ElastiCache::ReplicationGroupElastiCache Redis encrypts data at restaws-config-elasticache-redis-cluster-automatic-backup-check
AWS::RDS::DBInstanceRDS storage is encryptedaws-config-rds-storage-encrypted
AWS::S3::BucketS3 bucket has default server-side encryptionaws-config-s3-bucket-server-side-encryption-enabled
AWS::SNS::TopicSNS topic uses KMS encryption at restaws-config-sns-encrypted-kms
AWS::SQS::QueueSQS queue has server-side encryption enabledaws-config-sqs-queue-server-side-encryption-enabled
Microsoft.Compute/disksManaged disks are encrypted with customer-managed keysazure-mcsb-managed-disk-encryption
Microsoft.DocumentDB/databaseAccountsCosmos DB uses customer-managed keysazure-mcsb-cosmosdb-encryption
Microsoft.Sql/servers/databasesAzure SQL DB uses Transparent Data Encryptionazure-mcsb-sql-tde
Microsoft.Storage/storageAccountsStorage account encrypts data at restazure-mcsb-dp-04-storage-encryption
bigquery.googleapis.com/DatasetBigQuery datasets encrypted with CMEKgcp-cis-bigquery-cmek
compute.googleapis.com/DiskPersistent disks encrypted with CMEKgcp-cis-compute-disk-cmek
sqladmin.googleapis.com/InstanceCloud SQL instances use CMEK encryptiongcp-cis-cloudsql-encryption
storage.googleapis.com/BucketCloud Storage buckets encrypted with CMEKgcp-cis-storage-bucket-cmek