SQS Queues are not encrypted at rest Affecting SQS service in AWS


0.0
high
0
10
    Severity Framework Snyk CCSS
    Rule category Data / Encryption at Rest

Is your enviroment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
    Frameworks
  • Snyk ID SNYK-CC-00776
  • credit Snyk Research Team

Description

Unencrypted SQS queues may expose sensitive data to unauthorized parties. Enabling encryption at rest protects data by making it unreadable without the proper decryption key. This reduces the risk of data breaches and complies with data protection regulations.

How to fix?

Set the sqs_managed_sse_enabled attribute to true.

Example Configuration

resource "aws_sqs_queue" "allowed" {
  name                    = "allowed"
  sqs_managed_sse_enabled = true
}

Terraform