Skip to content

Conversation

@shahinshirvani
Copy link

Violation Id: PR-AWS-CFR-KMS-002

Violation Description:

This policy identifies KMS Customer Managed Keys(CMKs) which are not usable. When you create a CMK, it is enabled by default. If you disable a CMK or schedule it for deletion makes it unusable, it cannot be used to encrypt or decrypt data and AWS KMS does not rotate the backing keys until you re-enable it.

How to Fix:

Make sure you are following the Cloudformation template format presented here

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants