A Reflex rule for enforcing SQS Queue encryption. Will encrypt queues with the default KMS key.
To learn more about SQS Queue encryption, see the AWS Documentation.
To get started using Reflex, check out the Reflex Documentation.
To use this rule either add it to your reflex.yaml configuration file:
rules:
aws:
- enforce-sqs-queue-encryption:
configuration:
mode: remediate
version: latest
or add it directly to your Terraform:
module "enforce-sqs-queue-encryption" {
source = "git::https://github.com/reflexivesecurity/reflex-aws-sqs-queue-not-encrypted.git?ref=latest"
sns_topic_arn = module.central-sns-topic.arn
reflex_kms_key_id = module.reflex-kms-key.key_id
mode = "remediate"
}
Note: The sns_topic_arn and reflex_kms_key_id example values shown here assume you generated resources with reflex build. If you are using the Terraform on its own you need to provide your own valid values.
This rule has the following configuration options:
- mode
-
Sets the rule to operate in
detectorremediatemode.Required: No
Type: string
Possible values:
detect|remediateDefault:
detect
If you are interested in contributing, please review our contribution guide.
This Reflex rule is made available under the MPL 2.0 license. For more information view the LICENSE.