1. Assessment Phase

  • List RDS Resources and KMS Keys

2. Summary Phase

  • Review Encryption Plan and Select KMS Key

3. Configuration Phase

  • Create Encrypted Snapshot for RDS Instance/Cluster
  • Turn Off Old RDS Instances/Clusters
  • Create Encrypted RDS from Snapshot
  • Delete Old RDS Instances/Clusters

4. Validation Phase

  • Validate RDS Encryption and Operational Status
3 Credits

Encrypt Existing RDS Instances and Clusters

Overview

Encrypt your existing Amazon RDS instances and clusters to enhance data security by following this comprehensive configuration plan. This plan involves assessing your RDS resources to understand existing encryption statuses, selecting suitable AWS Key Management Service (KMS) keys, configuring encrypted snapshots, and subsequently managing older resources responsibly. It concludes with robust validation and rollback procedures to ensure a smooth and secure transition.

Execution Details

Assessment Phase

Assess and gather relevant data on all RDS instances and clusters, identifying those requiring encryption. Retrieve a list of KMS keys and aliases to help determine possible encryption configurations. This phase guides the user through evaluating which RDS resources need encryption and ensures all necessary information is collected to move forward with encryption efforts.

Summary Phase

Review and confirm the encryption plan by comparing existing KMS keys or exploring the need to create new ones. Determine the best approach to use an existing KMS key or create a new one, ensuring it conforms with the RDS encryption requirements. Update and present the encryption strategy based on user preferences.

Configuration Phase

Create encrypted copies of existing snapshots for RDS instances and clusters. This involves taking unencrypted snapshots and subsequently encrypting them with a selected KMS key. After ensuring encrypted snapshots are created and operational, the phase concludes by shutting down old, unencrypted RDS resources to reduce costs and avoid conflicts.

Validation Phase

Verify that all RDS databases and clusters are now encrypted and operate as expected. Retrieve and check the encryption statuses and operational states of these resources, ironing out any inconsistencies in connectivity or performance. Provide a thorough confirmation report to the user.

Rollback/Failure Handling

Prepare to revert to original states if migration issues arise. This involves restoring instances and clusters from snapshots and reconfiguring them to match original settings, minimizing downtime and ensuring consistency with the previous operation. If necessary, the plan outlines the deletion of old resources only after confirming that new configurations are stable and meet encryption standards.

Each phase of this plan is meticulously designed to ensure a secure and seamless cryptographic transformation of your RDS resources while minimizing operational disruption.