Neptune DB clusters should be encrypted at rest
Description
This control checks whether a Neptune DB cluster is encrypted at rest. The control fails if a Neptune DB cluster isn't encrypted at rest. Data at rest refers to any data that's stored in persistent, non-volatile storage for any duration. Encryption helps you protect the confidentiality of such data, reducing the risk that an unauthorized user can access it. Encrypting your Neptune DB clusters protects your data and metadata against unauthorized access. It also fulfills compliance requirements for data-at-rest encryption of production file systems.
Remediation
To remediate Neptune DB clusters without encryption at rest, you need to enable encryption for the cluster.
Steps
- Navigate to the Amazon Neptune console
- Select the DB cluster that needs remediation
- Click on 'Modify' to edit the cluster configuration
- In the 'Encryption' section, enable 'Encrypt database'
- Select a KMS key for encryption (or use the default AWS managed key)
- Review the encryption configuration
- Apply the changes during the next maintenance window or immediately
- Verify that encryption is enabled by checking the cluster details
- Test database connectivity to ensure the cluster is functioning properly
- Update any applications or documentation that reference the cluster