diff --git a/reference-artifacts/Custom-Scripts/lza-upgrade/src/convert-config.ts b/reference-artifacts/Custom-Scripts/lza-upgrade/src/convert-config.ts index 39523f5ec..b10a56ad2 100644 --- a/reference-artifacts/Custom-Scripts/lza-upgrade/src/convert-config.ts +++ b/reference-artifacts/Custom-Scripts/lza-upgrade/src/convert-config.ts @@ -799,6 +799,11 @@ export class ConvertAseaConfig { useCMK: false, }, }, + sqs: { + encryption: { + useCMK: false, + }, + }, s3: { encryption: { createCMK: true, diff --git a/src/mkdocs/docs/lza-upgrade/comparison/kms.md b/src/mkdocs/docs/lza-upgrade/comparison/kms.md index 564751fe5..95a82ea96 100644 --- a/src/mkdocs/docs/lza-upgrade/comparison/kms.md +++ b/src/mkdocs/docs/lza-upgrade/comparison/kms.md @@ -74,4 +74,12 @@ LZA: Creates a `sessionmanager-logs/session` key to encrypt Session Manager sess Upgrade: Create `sessionmanager-logs/session` key to encrypt Session Manager sessions in all accounts and all regions with VPCs. The `CloudWatch` key is used to encrypt Session Manager Log Group. -Post-upgrade: Customers can decide to manually remove the ASEA `SSM-Key` from individual accounts once they confirm that not CloudWatch logs or other data and resources is using the key. The Session Manager sessions data is short-lived, however the `SSM-Key` is also used to encrypt the `/[