Aws Unencrypted Secrets
Description
Detects Amazon EKS clusters that do not have encryption configuration enabled for protecting secrets at rest. Unencrypted secrets in EKS clusters can expose sensitive information like credentials, tokens, and configuration data to unauthorized access.
Detection Strategy
• Scans all EKS clusters in the specified AWS region
• Examines each cluster's encryption configuration settings
• Reports a vulnerability if a cluster's 'encryptionConfig' property is empty or missing
• Identifies affected clusters by their ARN (Amazon Resource Name)
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.