
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@renovosolutions/cdk-aspects-library-encryption-enforcement
Advanced tools
A library of CDK aspects that enforce encryption on AWS resources.
A CDK Aspects library that enforces encryption on AWS resources to help maintain security best practices in your infrastructure as code.
This library provides CDK Aspects that can be applied to your stacks to ensure that resources are properly encrypted. Currently, the library supports enforcing encryption on:
The aspects will add error annotations to any resources that don't have encryption enabled, preventing deployment unless encryption is properly configured or the resources are explicitly excluded.
See API
This project is licensed under the Apache License, Version 2.0 - see the LICENSE file for details.
The library provides two main aspects:
EFSEncryptionEnforcementAspect
- Enforces encryption on EFS File SystemsRDSEncryptionEnforcementAspect
- Enforces encryption on RDS Database Instances and ClustersYou can apply these aspects individually or use the EncryptionEnforcement.addAllAspects()
convenience method to add all aspects at once.
import { Stack, App, Aspects } from 'aws-cdk-lib';
import { Construct } from 'constructs';
import * as efs from 'aws-cdk-lib/aws-efs';
import * as rds from 'aws-cdk-lib/aws-rds';
import * as ec2 from 'aws-cdk-lib/aws-ec2';
import {
EFSEncryptionEnforcementAspect,
RDSEncryptionEnforcementAspect,
EncryptionEnforcement
} from '@renovosolutions/cdk-aspects-library-encryption-enforcement';
class MyStack extends Stack {
constructor(scope: Construct, id: string) {
super(scope, id);
// Create a VPC for our resources
const vpc = new ec2.Vpc(this, 'MyVpc');
// Create an EFS FileSystem with encryption enabled (compliant)
new efs.FileSystem(this, 'EncryptedFileSystem', {
vpc,
encrypted: true, // This is compliant
});
// Create an EFS FileSystem without encryption (non-compliant)
// This will cause a deployment error unless excluded
new efs.FileSystem(this, 'UnencryptedFileSystem', {
vpc,
encrypted: false, // This will be caught by the aspect
});
// Create an RDS instance with encryption enabled (compliant)
new rds.DatabaseInstance(this, 'EncryptedInstance', {
engine: rds.DatabaseInstanceEngine.MYSQL,
vpc,
storageEncrypted: true, // This is compliant
});
// Create an RDS instance without encryption (non-compliant)
// This will cause a deployment error unless excluded
new rds.DatabaseInstance(this, 'UnencryptedInstance', {
engine: rds.DatabaseInstanceEngine.MYSQL,
vpc,
storageEncrypted: false, // This will be caught by the aspect
});
// Method 1: Apply aspects individually
Aspects.of(this).add(new EFSEncryptionEnforcementAspect());
Aspects.of(this).add(new RDSEncryptionEnforcementAspect());
// Method 2: Apply all aspects at once with exclusions
// EncryptionEnforcement.addAllAspects(this, {
// excludeResources: ['UnencryptedFileSystem', 'UnencryptedInstance'],
// });
}
}
const app = new App();
new MyStack(app, 'MyStack');
app.synth();
from aws_cdk import (
Stack,
App,
Aspects,
aws_ec2 as ec2,
aws_efs as efs,
aws_rds as rds,
)
from constructs import Construct
from aspects_encryption_enforcement import (
EFSEncryptionEnforcementAspect,
RDSEncryptionEnforcementAspect,
EncryptionEnforcement
)
class MyStack(Stack):
def __init__(self, scope: Construct, id: str, **kwargs) -> None:
super().__init__(scope, id, **kwargs)
# Create a VPC for our resources
vpc = ec2.Vpc(self, 'MyVpc')
# Create an EFS FileSystem with encryption enabled (compliant)
efs.FileSystem(self, 'EncryptedFileSystem',
vpc=vpc,
encrypted=True # This is compliant
)
# Create an EFS FileSystem without encryption (non-compliant)
# This will cause a deployment error unless excluded
efs.FileSystem(self, 'UnencryptedFileSystem',
vpc=vpc,
encrypted=False # This will be caught by the aspect
)
# Create an RDS instance with encryption enabled (compliant)
rds.DatabaseInstance(self, 'EncryptedInstance',
engine=rds.DatabaseInstanceEngine.MYSQL,
vpc=vpc,
storage_encrypted=True # This is compliant
)
# Create an RDS instance without encryption (non-compliant)
# This will cause a deployment error unless excluded
rds.DatabaseInstance(self, 'UnencryptedInstance',
engine=rds.DatabaseInstanceEngine.MYSQL,
vpc=vpc,
storage_encrypted=False # This will be caught by the aspect
)
# Method 1: Apply aspects individually
Aspects.of(self).add(EFSEncryptionEnforcementAspect())
Aspects.of(self).add(RDSEncryptionEnforcementAspect())
# Method 2: Apply all aspects at once with exclusions
# EncryptionEnforcement.add_all_aspects(self,
# exclude_resources=['UnencryptedFileSystem', 'UnencryptedInstance']
# )
app = App()
MyStack(app, 'MyStack')
app.synth()
using Amazon.CDK;
using EC2 = Amazon.CDK.AWS.EC2;
using EFS = Amazon.CDK.AWS.EFS;
using RDS = Amazon.CDK.AWS.RDS;
using Constructs;
using renovosolutions;
namespace MyApp
{
public class MyStack : Stack
{
internal MyStack(Construct scope, string id, IStackProps props = null) : base(scope, id, props)
{
// Create a VPC for our resources
var vpc = new EC2.Vpc(this, "MyVpc");
// Create an EFS FileSystem with encryption enabled (compliant)
new EFS.FileSystem(this, "EncryptedFileSystem", new EFS.FileSystemProps
{
Vpc = vpc,
Encrypted = true // This is compliant
});
// Create an EFS FileSystem without encryption (non-compliant)
// This will cause a deployment error unless excluded
new EFS.FileSystem(this, "UnencryptedFileSystem", new EFS.FileSystemProps
{
Vpc = vpc,
Encrypted = false // This will be caught by the aspect
});
// Create an RDS instance with encryption enabled (compliant)
new RDS.DatabaseInstance(this, "EncryptedInstance", new RDS.DatabaseInstanceProps
{
Engine = RDS.DatabaseInstanceEngine.MYSQL,
Vpc = vpc,
StorageEncrypted = true // This is compliant
});
// Create an RDS instance without encryption (non-compliant)
// This will cause a deployment error unless excluded
new RDS.DatabaseInstance(this, "UnencryptedInstance", new RDS.DatabaseInstanceProps
{
Engine = RDS.DatabaseInstanceEngine.MYSQL,
Vpc = vpc,
StorageEncrypted = false // This will be caught by the aspect
});
// Method 1: Apply aspects individually
Aspects.Of(this).Add(new EFSEncryptionEnforcementAspect());
Aspects.Of(this).Add(new RDSEncryptionEnforcementAspect());
// Method 2: Apply all aspects at once with exclusions
// EncryptionEnforcement.AddAllAspects(this, new EncryptionEnforcementAspectProps
// {
// ExcludeResources = new[] { "UnencryptedFileSystem", "UnencryptedInstance" }
// });
}
}
class Program
{
static void Main(string[] args)
{
var app = new App();
new MyStack(app, "MyStack");
app.Synth();
}
}
}
If you have specific resources that should be exempt from encryption enforcement, you can exclude them by ID:
// Exclude specific resources
Aspects.of(stack).add(new EFSEncryptionEnforcementAspect({
excludeResources: ['MyFileSystem', 'MyOtherFileSystem'],
}));
// Or exclude resources from all aspects at once
EncryptionEnforcement.addAllAspects(stack, {
excludeResources: ['MyFileSystem', 'MyDatabaseInstance'],
});
The excludeResources
property accepts an array of resource IDs. You can use either the L1 (CfnResource) ID or the L2 (higher-level construct) ID.
FAQs
A library of CDK aspects that enforce encryption on AWS resources.
We found that @renovosolutions/cdk-aspects-library-encryption-enforcement demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.