sns-encrypted-kms - AWS Config


Checks if SNS topics are encrypted with AWS Key Management Service (AWS KMS). The rule is NON_COMPLIANT if an SNS topic is not encrypted with AWS KMS. Optionally, specify the key ARNs, the alias ARNs, the alias name, or the key IDs for the rule to check.


Resource Types: AWS::SNS::Topic

Trigger type: Configuration changes

AWS Region: All supported AWS regions


kmsKeyIds (Optional)
Type: CSV

Comma-separated list of AWS KMS key Amazon Resource Names (ARNs), KMS alias ARNs, KMS alias names, or KMS key IDs for the rule to check.

Proactive Evaluation

For steps on how to run this rule in proactive mode, see Evaluating Your Resources with AWS Config Rules. For this rule to return COMPLIANT in proactive mode, the resource configuration schema for the StartResourceEvaluation API needs to include the following inputs, encoded as a string:

"ResourceConfiguration": ... { "KmsMasterKeyId": "my-kms-key-Id" } ...

For more information on proactive evaluation, see Evaluation Mode.

AWS CloudFormation template

To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.