Ensure your Amazon EFS file systems use encryption at rest with AWS KMS, and safely migrate any unencrypted file systems to new, encrypted EFS instances. The plan walks through discovering all existing EFS file systems, choosing which ones to migrate and which KMS keys to use, creating equivalent encrypted file systems, migrating data using your preferred method (AWS DataSync or EC2-based tools), updating applications to use the new file systems, and finally validating encryption, application behavior, and decommissioning old unencrypted resources.
The approach emphasizes:
1. Inventory EFS file systems and encryption status
This phase starts by discovering all EFS file systems in the in-scope AWS accounts and regions. For each file system, the plan captures:
File systems are categorized as encrypted or unencrypted, with unencrypted ones clearly flagged as migration candidates. Results are stored in a structured format for later steps.
2. Map mount targets, access points, and network access
Next, the plan builds a network and access topology for each EFS file system by:
EFS file systems without mount targets or access points are flagged as likely backend-only or inactive. This mapping becomes the template for building equivalent configuration on new encrypted file systems.
3. Guide selection of file systems in scope and KMS keys
Using the inventory, the plan presents you with all unencrypted EFS file systems, surfaced with:
You are guided to:
The outcome is a structured decision record specifying, per file system, in-scope status, target KMS key, and any special requirements. Exclusions are documented with reasons.
4. Choose migration methods per EFS file system
For each in-scope unencrypted file system, the plan then helps you select a migration method. It:
You can note constraints like maintenance windows, large data volume, high change rate, or compliance tooling requirements. Any file systems not yet assigned a method are flagged with required follow-up. The result is a mapping of each in-scope file system to its chosen migration approach and constraints.
5. Create new encrypted EFS file systems with chosen KMS keys
Using your earlier decisions, the plan defines and creates new encrypted EFS file systems for each selected unencrypted source. For each:
encrypted=true and associates the selected KMS key (AWS-managed or customer-managed)After creation, each new file system is checked to ensure encryption is enabled, the correct KMS key is applied, and performance/throughput settings align with expectations. A mapping from each source to its new encrypted FileSystemId and KMS key is recorded.
6. Recreate mount targets and access points for encrypted EFS
To maintain or improve network and access behavior, the plan then:
The mapping between old and new EFS file systems is updated to include mount target IDs and access point IDs, forming the foundation for data migration and application cutover.
7. User-driven data migration with AWS DataSync (where selected)
For file systems designated for AWS DataSync-based migration, the plan:
You are then guided to:
Migration status for each file system is tracked (e.g., not started, in progress, final sync complete), and you validate that data, structure, permissions, and metadata on the encrypted EFS meet expectations.
8. User-driven data migration with EC2 + rsync (where selected)
For file systems where you selected EC2-based tools, the plan:
It then helps you outline high-level migration parameters per file system:
You are responsible for provisioning and configuring EC2 instances (or equivalent compute), mounting both EFS file systems, running rsync or similar tools, monitoring transfers, and handling errors. The plan provides a structure to record status (e.g., initial copy complete, final sync complete) and prompts you to validate data consistency and permissions on the encrypted targets.
9. Update AWS resources to use encrypted EFS
Once data is fully migrated and final syncs are complete, the plan turns to application cutover. Using the mapping of old to new EFS file systems and their access points, and taking into account migration status, it:
You then apply these changes:
fstab entries, and any launch templates or Auto Scaling configurations that embed EFS detailsIf you require phased or blue/green cutover, the plan supports documenting and executing an incremental sequence of updates while monitoring application behavior. Completion is tracked per application or workload, and exceptions are documented with remediation plans.
10. Decommission and delete unencrypted EFS file systems
After confirming that workloads have fully transitioned, the plan leads you through safe decommissioning of the old unencrypted file systems:
You are reminded that deletion is irreversible and must confirm data has been fully validated on the encrypted EFS. Approved unencrypted file systems are then cleaned up (removing access points and mount targets if required) and deleted. The plan verifies removal from inventory and produces a decommissioning log mapping each deleted unencrypted file system to its encrypted replacement and recording completion details.
11. Validate encryption status and KMS usage
To close the loop on the security objectives, the plan performs a final validation of EFS encryption across the in-scope environment:
Any remaining unencrypted file systems in scope are flagged and documented as exceptions. The mapping from original unencrypted to encrypted replacements is reviewed for completeness, and basic health checks confirm the encrypted file systems are available and not reporting encryption or KMS-related issues. A validation report summarizes encryption status, KMS key usage, and whether project goals have been met.
12. User validation of applications on encrypted EFS
Finally, the plan emphasizes application-level validation:
You also confirm that operational processes (backups, monitoring, maintenance tasks) continue to work correctly against the encrypted file systems. The phase concludes with your formal sign-off that applications are successfully running on encrypted EFS, or with a clearly documented list of outstanding concerns requiring further work.