EKS should have the encryption of secrets enabled
Default Severity: high
Explanation
EKS cluster resources should have the encryption_config block set with protection of the secrets resource.
Possible Impact
EKS secrets could be read if compromised
Suggested Resolution
Enable encryption of EKS secrets
Insecure Example
The following example will fail the aws-eks-encrypt-secrets check.
resource "aws_eks_cluster" "bad_example" {
name = "bad_example_cluster"
role_arn = var.cluster_arn
vpc_config {
endpoint_public_access = false
}
}
Secure Example
The following example will pass the aws-eks-encrypt-secrets check.
resource "aws_eks_cluster" "good_example" {
encryption_config {
resources = [ "secrets" ]
provider {
key_arn = var.kms_arn
}
}
name = "good_example_cluster"
role_arn = var.cluster_arn
vpc_config {
endpoint_public_access = false
}
}