CloudWiki
Rules
Get a free AWS Well-Architected Assessment ->
Description

EBS snapshots not in use refer to the snapshots of EBS volumes that are no longer in use by any active EC2 instance. These unused snapshots can incur unnecessary costs and pose a security risk if left unmanaged. It is important to regularly monitor and delete unused EBS snapshots to ensure efficient resource utilization and prevent unauthorized access to sensitive data.

Remediation

Here are the remediation steps for EBS snapshots not in use:

  1. Identify the snapshots that are not in use:a. Determine the age of each snapshot and check if it has been used recently.b. Check if the snapshots are associated with running instances or AMIs.
  2. Delete unused snapshots:a. Verify that the snapshots are not required for any business or regulatory purposes.b. Delete the snapshots that are not in use.
  3. Set up a snapshot deletion policy:a. Establish a policy for the automatic deletion of EBS snapshots that are not in use for a specific period.b. Implement the policy using a script or a third-party tool.
  4. Monitor EBS snapshots:a. Set up an alerting mechanism to notify you when an unused snapshot is created.b. Regularly monitor the EBS snapshots to ensure that they are in use.
  5. Educate users:a. Train the users who have access to EBS snapshots about the risks of keeping unused snapshots.b. Encourage them to follow best practices for managing EBS snapshots and to delete unused snapshots regularly.
Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.
Deploy cloud infrastructure changes with confidence. Troubleshoot faster with the complete context of your cloud environment.
GET STARTED