TF 0225 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

EKS should have the encryption of secrets enabled

Property Value
Language terraform
Severity high
Service eks
Provider AWS
Vulnerability Type omission

Description

The EKS cluster is configured without enabling encryption for Kubernetes secrets using a customer-managed KMS key. This leaves sensitive data stored as secrets in the cluster unprotected at rest.

Impact

If secret encryption is not enabled, anyone who gains unauthorized access to the underlying storage or etcd can read sensitive secrets in plaintext, potentially exposing credentials, API keys, or other confidential information and leading to data breaches or privilege escalation.

Resolution

Enable encryption of EKS secrets