

# sns-encrypted-kms
<a name="sns-encrypted-kms"></a>

Checks if SNS topics are encrypted with Amazon Key Management Service (Amazon KMS). The rule is NON\$1COMPLIANT if an SNS topic is not encrypted with Amazon KMS. Optionally, specify the key ARNs, the alias ARNs, the alias name, or the key IDs for the rule to check. 



**Identifier:** SNS\$1ENCRYPTED\$1KMS

**Resource Types:** AWS::SNS::Topic

**Trigger type:** Configuration changes

**Amazon Web Services Region:** All supported Amazon regions

**Parameters:**

kmsKeyIds (Optional)Type: CSV  
Comma-separated list of Amazon KMS key Amazon Resource Names (ARNs), KMS alias ARNs, KMS alias names, or KMS key IDs for the rule to check.

## Proactive Evaluation
<a name="w2aac20c16c17b7e1517c19"></a>

 For steps on how to run this rule in proactive mode, see [Evaluating Your Resources with Amazon Config Rules](./evaluating-your-resources.html#evaluating-your-resources-proactive). For this rule to return COMPLIANT in proactive mode, the resource configuration schema for the [StartResourceEvaluation](https://docs.amazonaws.cn/config/latest/APIReference/API_StartResourceEvaluation.html) API needs to include the following inputs, encoded as a string: 

```
"ResourceConfiguration":
...
{
   "KmsMasterKeyId": "my-kms-key-Id"
} 
...
```

 For more information on proactive evaluation, see [Evaluation Mode](./evaluate-config-rules.html). 

## Amazon CloudFormation template
<a name="w2aac20c16c17b7e1517c21"></a>

To create Amazon Config managed rules with Amazon CloudFormation templates, see [Creating Amazon Config Managed Rules With Amazon CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).