-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(firehose): add new check firehose_stream_encrypted_at_rest
#5635
Merged
MrCloudSec
merged 11 commits into
master
from
PRWLR-4465-ensure-firehose-delivery-streams-are-encrypted-at-rest
Nov 14, 2024
Merged
feat(firehose): add new check firehose_stream_encrypted_at_rest
#5635
MrCloudSec
merged 11 commits into
master
from
PRWLR-4465-ensure-firehose-delivery-streams-are-encrypted-at-rest
Nov 14, 2024
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
…o PRWLR-4465-ensure-firehose-delivery-streams-are-encrypted-at-rest
github-actions
bot
added
the
provider/aws
Issues/PRs related with the AWS provider
label
Nov 5, 2024
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #5635 +/- ##
==========================================
- Coverage 89.91% 89.87% -0.04%
==========================================
Files 1128 1130 +2
Lines 35180 35224 +44
==========================================
+ Hits 31631 31659 +28
- Misses 3549 3565 +16 ☔ View full report in Codecov by Sentry. |
…s-are-encrypted-at-rest
MrCloudSec
reviewed
Nov 13, 2024
MrCloudSec
reviewed
Nov 13, 2024
MrCloudSec
reviewed
Nov 13, 2024
...s/firehose/firehose_stream_encrypted_at_rest/firehose_stream_encrypted_at_rest.metadata.json
Outdated
Show resolved
Hide resolved
MrCloudSec
approved these changes
Nov 14, 2024
MrCloudSec
deleted the
PRWLR-4465-ensure-firehose-delivery-streams-are-encrypted-at-rest
branch
November 14, 2024 15:27
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Context
Amazon Kinesis Data Firehose
is a fully managed service for loading real-time streaming data into data lakes, data stores, and analytics services. For data security,AWS
providesserver-side encryption (SSE)
, which encrypts data at rest within the storage layer using keys fromAWS Key Management Service (KMS)
. This ensures that any data written toKinesis Firehose
is encrypted before storage, helping to protect sensitive information and meet compliance standards.Description
This check ensures that
Amazon Kinesis Data Firehose delivery streams
have server-side encryption enabled for data at rest. The check fails if a delivery stream is unencrypted, which means that the data stored withinFirehose
could be accessed without encryption safeguards.Checklist
License
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.