Neptune DB cluster snapshots should be encrypted at rest
Description
This control checks whether a Neptune DB cluster snapshot is encrypted at rest. The control fails if a Neptune DB cluster isn't encrypted at rest. Data at rest refers to any data that's stored in persistent, non-volatile storage for any duration. Encryption helps you protect the confidentiality of such data, reducing the risk that an unauthorized user gets access to it. Data in Neptune DB clusters snapshots should be encrypted at rest for an added layer of security.
Remediation
To remediate Neptune DB cluster snapshots without encryption at rest, you need to ensure snapshots are created from encrypted clusters or recreate them with encryption enabled.
Steps
- Navigate to the Amazon Neptune console
- Go to 'Snapshots' in the left navigation pane
- Identify unencrypted snapshots that need remediation
- Create a new Neptune DB cluster with encryption enabled
- Restore data from the unencrypted snapshot to the new encrypted cluster
- Create a new snapshot from the encrypted cluster
- Update any applications or documentation to use the new encrypted snapshot
- Delete the old unencrypted snapshot once verified
- Verify that the new snapshot shows as encrypted
- Test restore functionality from the encrypted snapshot