Kinesis streams should be encrypted to ensure sensitive data is kept private. Additionally, non-default KMS keys should be used so granularity of access control can be ensured.
Intercepted data can be read in transit
Enable in transit encryption
The following example will fail the aws-kinesis-enable-in-transit-encryption check.
The following example will pass the aws-kinesis-enable-in-transit-encryption check.