SQS Queues are not encrypted at rest Affecting SQS service in AWS


Severity

0.0
high
0
10
Severity Framework
Snyk CCSS
Rule category
Data/ Encryption at Rest

Is your environment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
Frameworks
  • Snyk IDSNYK-CC-00776
  • creditSnyk Research Team

Description

Unencrypted SQS queues may expose sensitive data to unauthorized parties. Enabling encryption at rest protects data by making it unreadable without the proper decryption key. This reduces the risk of data breaches and complies with data protection regulations.

How to fix?

Set the sqs_managed_sse_enabled attribute to true.

Example Configuration

resource "aws_sqs_queue" "allowed" {
  name                    = "allowed"
  sqs_managed_sse_enabled = true
}

Terraform