AWS CodePipeline
User Guide (API Version 2015-07-09)

A new console design is available for this service. Although the procedures in this guide were written for the older version of the console, you will find many of the concepts and basic procedures in this guide still apply.

Configure Server-Side Encryption for S3 Buckets When Using AWS CloudFormation or the CLI

When you create a pipeline using AWS CloudFormation or the CLI, you must configure server-side encryption manually. Use the sample bucket policy above, and then create your own customer-managed SSE-KMS encryption keys. You can also choose to use your own keys instead of the default Amazon S3 key in general. Some reasons for doing so include:

Cryptographic best practices discourage extensive reuse of encryption keys. As a best practice, rotate your key on a regular basis. To create new cryptographic material for your AWS Key Management Service (AWS KMS) customer master keys (CMKs), you can create new CMKs, and then change your applications or aliases to use the new CMKs. Or, you can enable automatic key rotation for an existing CMK.

To rotate your SSE-KMS customer master key, see Rotating Customer Master Keys.