Skip to content

[FEATURE] Add parameter to control whether EncryptionConfigRule checks for any KMS encryption or enforces a specific KMS key. #50

@ditahkk

Description

@ditahkk

Feature Description

Add parameter to control whether EncryptionConfigRule checks for any KMS encryption or enforces a specific KMS key.

Use Case

Problem: Currently EncryptionConfigRule accepts any KMS key for compliance. Some customers may want to enforce their specific LogGuardian KMS key only, while others prefer flexibility to use any KMS key.

Solution: Add EnforceSpecificKMSKey parameter to make this configurable.

Proposed Solution

Add parameter:

  • EnforceSpecificKMSKey (true/false, default: false)
  • When true: Add InputParameters with KmsKeyId to enforce LogGuardian key
  • When false: No InputParameters (accepts any KMS key)

Additional Context

Files: template.yaml (EncryptionConfigRule section)
Current: No InputParameters (any KMS key accepted)
Change: Conditional InputParameters based on parameter

Acceptance Criteria:

  • EnforceSpecificKMSKey parameter added
  • When true: EncryptionConfigRule requires LogGuardian KMS key
  • When false: EncryptionConfigRule accepts any KMS encryption
  • Default false maintains current behavior
  • Works with both created and

Metadata

Metadata

Assignees

No one assigned

    Labels

    lowDenotes less urgent tasks.

    Type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions