Check provider logo

AWS KMS customer managed keys should not be multi-Region

kms_cmk_not_multi_region

Severityhigh
Servicekms
by Prowler

Ensure that AWS KMS customer managed keys (CMKs) are not multi-region to maintain strict data control and compliance with security best practices.

Risk

Multi-region KMS keys can increase the risk of unauthorized access and data exposure, as managing access controls and auditing across multiple regions becomes more complex. This expanded attack surface may lead to compliance violations and data breaches.

Run this check with Prowler CLI

prowler aws --checks kms_cmk_not_multi_region

ARN template
arn:partition:kms:region:account-id:key/resource-id

Recommendation

Identify and replace multi-region keys with single-region KMS keys to enhance security and access control.

Remediation

CLI

aws kms create-key --no-multi-region

Terraform

resource "aws_kms_key" "example" { description = "Single-region key" multi_region = false }

Other

Multi-region keys should be used only when absolutely necessary, such as for cross-region disaster recovery, and should be carefully managed with strict access controls.

Source Code

Resource Type

AwsKmsKey

References