org.sonar.l10n.py.rules.python.S6332.html Maven / Gradle / Ivy
Amazon Elastic File System (EFS) is a serverless file system that does not require provisioning or managing storage. Stored files can be
automatically encrypted by the service. In the case that adversaries gain physical access to the storage medium or otherwise leak a message they are
not able to access the data.
Ask Yourself Whether
- The file system contains sensitive data that could cause harm when leaked.
- There are compliance requirements for the service to store data encrypted.
There is a risk if you answered yes to any of those questions.
Recommended Secure Coding Practices
It’s recommended to encrypt EFS file systems that contain sensitive information. Encryption and decryption are handled transparently by EFS, so no
further modifications to the application are necessary.
Sensitive Code Example
For aws_cdk.aws_efs.FileSystem and aws_cdk.aws_efs.CfnFileSystem:
from aws_cdk import (
aws_efs as efs
)
efs.FileSystem(
self,
"example",
encrypted=False # Sensitive
)
Compliant Solution
For aws_cdk.aws_efs.FileSystem and aws_cdk.aws_efs.CfnFileSystem:
from aws_cdk import (
aws_efs as efs
)
efs.FileSystem(
self,
"example",
encrypted=True
)
See
- AWS Documentation - Data encryption in Amazon EFS
- CWE - CWE-311 - Missing Encryption of Sensitive Data
© 2015 - 2024 Weber Informatics LLC | Privacy Policy