AWS Config
Developer Guide

efs-encrypted-check

Checks whether Amazon Elastic File System (Amazon EFS) is configured to encrypt the file data using AWS Key Management Service (AWS KMS). The rule is NON_COMPLIANT if the encrypted key is set to false on DescribeFileSystems or if the KmsKeyId key on DescribeFileSystems does not match the KmsKeyId parameter.

Identifier: EFS_ENCRYPTED_CHECK

Trigger type: Periodic

Parameters:

kmskeyid (optional)

Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the Amazon EFS file system.

AWS CloudFormation template

To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.