Securing Lambda environment variables
For securing your environment variables, you can use server-side encryption to protect your data at rest and client-side encryption to protect your data in transit.
Note
To increase database security, we recommend that you use AWS Secrets Manager instead of environment variables to store database credentials. For more information, see Using AWS Lambda with Amazon RDS.
Security at rest
Lambda always provides server-side encryption at rest with an AWS KMS key. By default, Lambda uses an AWS managed key. If this default behavior suits your workflow, you don't need to set up anything else. Lambda creates the AWS managed key in your account and manages the permissions for you. AWS doesn't charge you to use this key.
If you prefer, you can provide an AWS KMS customer managed key instead. You might do this to have control over rotation of the KMS key or to meet the requirements of your organization for managing KMS keys. When you use a customer managed key, only users in your account with access to the KMS key can view or manage environment variables on the function.
Customer managed keys incur standard AWS KMS charges. For more information, see AWS Key Management Service pricing
Security in transit
For additional security, you can enable helpers for encryption in transit, which ensures that your environment variables are encrypted client-side for protection in transit.
To configure encryption for your environment variables
-
Use the AWS Key Management Service (AWS KMS) to create any customer managed keys for Lambda to use for server-side and client-side encryption. For more information, see Creating keys in the AWS Key Management Service Developer Guide.
-
Using the Lambda console, navigate to the Edit environment variables page.
Open the Functions page
of the Lambda console. -
Choose a function.
-
Choose Configuration, then choose Environment variables from the left navigation bar.
-
In the Environment variables section, choose Edit.
-
Expand Encryption configuration.
-
(Optional) Enable console encryption helpers to use client-side encryption to protect your data in transit.
-
Under Encryption in transit, choose Enable helpers for encryption in transit.
-
For each environment variable that you want to enable console encryption helpers for, choose Encrypt next to the environment variable.
-
Under AWS KMS key to encrypt in transit, choose a customer managed key that you created at the beginning of this procedure.
-
Choose Execution role policy and copy the policy. This policy grants permission to your function's execution role to decrypt the environment variables.
Save this policy to use in the last step of this procedure.
-
Add code to your function that decrypts the environment variables. To see an example, choose Decrypt secrets snippet.
-
-
(Optional) Specify your customer managed key for encryption at rest.
-
Choose Use a customer master key.
-
Choose a customer managed key that you created at the beginning of this procedure.
-
-
Choose Save.
-
Set up permissions.
If you're using a customer managed key with server-side encryption, grant permissions to any users or roles that you want to be able to view or manage environment variables on the function. For more information, see Managing permissions to your server-side encryption KMS key.
If you're enabling client-side encryption for security in transit, your function needs permission to call the
kms:Decrypt
API operation. Add the policy that you saved previously in this procedure to the function's execution role.
Managing permissions to your server-side encryption KMS key
No AWS KMS permissions are required for your user or the function's execution role to use the default encryption key. To use a customer managed key, you need permission to use the key. Lambda uses your permissions to create a grant on the key. This allows Lambda to use it for encryption.
-
kms:ListAliases
– To view keys in the Lambda console. -
kms:CreateGrant
,kms:Encrypt
– To configure a customer managed key on a function. -
kms:Decrypt
– To view and manage environment variables that are encrypted with a customer managed key.
You can get these permissions from your AWS account or from a key's resource-based permissions policy.
ListAliases
is provided by the managed policies for
Lambda. Key policies grant the remaining permissions to users in the Key users
group.
Users without Decrypt
permissions can still manage functions, but they can't view environment
variables or manage them in the Lambda console. To prevent a user from viewing environment variables, add a
statement to the user's permissions that denies access to the default key, a customer managed key, or all keys.
Example IAM policy – Deny access by key ARN
{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Deny", "Action": [ "kms:Decrypt" ], "Resource": "arn:aws:kms:us-east-2:111122223333:key/3be10e2d-xmpl-4be4-bc9d-0405a71945cc" } ] }
For details on managing key permissions, see Key policies in AWS KMS in the AWS Key Management Service Developer Guide.