RESOURCE
KMS Key Management
Type: AWS::KMS::Key
Account: 012517218447
LOCATION
Cloud: AWS
Region: us-east-2 (Ohio)
Account: 012517218447
COMPLIANCE FRAMEWORKS
HITRUST 09.x
NIST SC-12
SOC 2 CC6.1
TIMESTAMP
2026-04-16T14:14:50Z
WHY FLAGGED
No customer-managed KMS keys exist in the account. All encryption relies on AWS-managed keys, giving the organization no control over key rotation, access policies, or cross-account sharing. Required for HITRUST and SOC 2 key management controls.
HOW TO FIX
1. Create CMK: aws kms create-key --description "TITAN-prod-data-key" --key-usage ENCRYPT_DECRYPT
2. Enable automatic rotation: aws kms enable-key-rotation --key-id <key-id>
3. Apply key policy restricting access to specific IAM roles
4. Migrate EBS, S3, and RDS to use the new CMK