Check provider logo

AWS Backup recovery point is encrypted at rest

backup_recovery_point_encrypted

Severitymedium
Servicebackup
by Prowler

AWS Backup recovery points are evaluated for encryption at rest using the backup vault's KMS configuration. Items lacking vault-level encryption are highlighted, regardless of the source resource's encryption.

Risk

Unencrypted recovery points can be read or copied if vault access is obtained, enabling offline analysis and data theft (confidentiality). Snapshots or restores may be altered (integrity), and unsafe restores can disrupt recovery operations (availability).

Run this check with Prowler CLI

prowler aws --checks backup_recovery_point_encrypted

Recommendation

Encrypt all recovery points with KMS, preferring customer-managed keys for rotation and control. Apply least privilege to keys and vaults, require encrypted copies across accounts/Regions, and continuously monitor for unencrypted artifacts. Use aws/backup or CMEK consistently.

Remediation

Native IaC
Terraform
Other
  1. In AWS Backup, go to Backup vaults > Create backup vault
  2. Enter a name and select a KMS key (aws/backup or a customer-managed key)
  3. Save the vault
  4. Go to Backup plans > select your plan > Edit and set the Target backup vault to the encrypted vault > Save
  5. To remediate existing unencrypted recovery points: Recovery points > select the item > Copy > choose the encrypted vault > Start copy, then delete the original unencrypted recovery point

Source Code

Resource Type

AwsBackupRecoveryPoint

References