

# ecr-repository-cmk-encryption-enabled
<a name="ecr-repository-cmk-encryption-enabled"></a>

Checks if ECR repository is encrypted at rest using customer-managed KMS key. This rule is NON\$1COMPLIANT if the repository is encrypted using AES256 or the default KMS key ('aws/ecr'). 



**Identifier:** ECR\$1REPOSITORY\$1CMK\$1ENCRYPTION\$1ENABLED

**Resource Types:** AWS::ECR::Repository

**Trigger type:** Configuration changes

**AWS Region:** All supported AWS regions except Asia Pacific (New Zealand), Asia Pacific (Thailand), Asia Pacific (Malaysia), Mexico (Central), Israel (Tel Aviv), Asia Pacific (Taipei), Canada West (Calgary) Region

**Parameters:**

kmsKeyArns (Optional)Type: CSV  
Comma-separated list of KMS key Amazon Resource Names (ARNs) intended to encrypt the ECR repository.

## AWS CloudFormation template
<a name="w2aac20c16c17b7d641c19"></a>

To create AWS Config managed rules with AWS CloudFormation templates, see [Creating AWS Config Managed Rules With AWS CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).