Overview
Overview
Cyscale looks for managed databases that are not encrypted. Security attacks are inevitable, however, with encryption in place, intruders will not be able to analyse or understand the data they gain access to in the event of a breach.
Remediation guidance
Depending on the provider and the service you use, check out the following resources:
AWS
In AWS, you can only encrypt a database when you create it. However, you can create a snapshot of a database, encrypt that snapshot, and restore it as encrypted.
From the Console
Perform the following actions to create an encrypted database instance from the current one:
- Open the security settings using the "Open in AWS" menu option
- Select
Actions, and thenTake a snapshot - Give it a name and click
Take snapshot - Select the newly created snapshot, and then
Actions,Copy snapshot - Select the region and give it a name
- Select a KMS key to encrypt the database with
- After you created the copy, select it
- Select
Actions, and thenRestore snapshot - Select the appropriate settings and click
Restore DB Instance
Default Value
By default, encryption is turned on when creating a new database.
References
Azure
- Data encryption for Azure Database for MySQL by using the Azure portal
- Data encryption for Azure Database for MySQL - Flexible Server by using the Azure portal Preview
- Data encryption for Azure Database for PostgreSQL Single server by using the Azure portal
- Security in Azure Database for PostgreSQL - Flexible Server
Google Cloud
Alibaba
Service-wide remediation
Recommended when many resources are affected: fix the platform baseline first so new resources inherit the secure setting, then remediate the existing flagged resources in batches.
Azure
Use management group or subscription Azure Policy assignments, remediation tasks where supported, landing-zone standards, and IaC modules so drift is prevented at scale.
AWS
Use AWS Organizations guardrails, AWS Config rules or conformance packs where they fit, approved account baselines, and IaC modules so new resources inherit the secure setting.
Alibaba Cloud
Use Resource Directory guardrails, account baselines, and IaC modules so the secure setting is applied consistently across environments.
Google Cloud
Use organization or folder policies where available, shared project templates, logs and alerting baselines, and IaC modules so new resources inherit the secure setting.
Operational rollout
- Fix the baseline first at the account, subscription, project, cluster, or tenant scope that owns this control.
- Remediate the currently affected resources in batches, starting with internet-exposed and production assets.
- Re-scan and track approved exceptions with an owner and expiry date.
Query logic
These are the stored checks tied to this control.
Azure MySQL Servers with no encryption
Connectors
Covered asset types
Expected check: eq []
{ mySqlServers (where: {encrypted: false}) {...AssetFragment} }Azure MySQL Flexible Servers with no encryption
Connectors
Covered asset types
Expected check: eq []
{ mySqlFlexibleServers (where: {encrypted: false}) {...AssetFragment} }Azure PostgreSQL Servers with no encryption
Connectors
Covered asset types
Expected check: eq []
{ postgreSqlServers (where: {encrypted: false}) {...AssetFragment} }Azure PostgreSQL Flexible Servers with no encryption
Connectors
Covered asset types
Expected check: eq []
{ postgreSqlFlexibleServers (where: {encrypted: false}) {...AssetFragment} }AWS RDS with no encryption
Connectors
Covered asset types
Expected check: eq []
{ dbInstances (where: { cloudProvider: "aws" encrypted: false }) {...AssetFragment} }ApsaraDB RDS with no encryption
Connectors
Covered asset types
Expected check: eq []
{ dbInstances (where: { cloudProvider: "alibaba", encrypted: false }) {...AssetFragment} }Google Cloud Cloud SQL with no encryption
Connectors
Covered asset types
Expected check: eq []
{ cloudSqlInstances (where: { encrypted: false }) {...AssetFragment} }Azure MariaDB Servers with no encryption
Connectors
Covered asset types
Expected check: eq []
{
mariaDbServers(where: { encrypted: false }) {...AssetFragment}
}
Alibaba Cloud
AWS
Google Cloud
Microsoft Azure