In transit encryption is disabled for Memory store instances Affecting Redis service in Google


Severity

0.0
high
0
10
Severity Framework
Snyk CCSS
Rule category
General/ Data

Is your environment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
Frameworks
CIS-ControlsCSA-CCMGDPRHIPAAISO-27001NIST-800-53PCI-DSSSOC-2
  • Snyk IDSNYK-CC-00430
  • creditSnyk Research Team

Description

Unencrypted communication between Redis client and server is vulnerable to eavesdropping and unauthorized modification.

How to fix?

Set transit_encryption_mode to SERVER_AUTHENTICATION.

Example configuration:.

resource "google_redis_instance" "allowed" {
  name                    = "memory-cache"
  memory_size_gb          = 1
  transit_encryption_mode = "SERVER_AUTHENTICATION"
}