More Info:

Detect the KMS Keys that are scheduled to be destroyed. NOTE: Data encrypted using the key cannot be decrypted once the key has been destroyed.

Risk Level

High

Address

Operational Maturity, Security

Compliance Standards

HITRUST

Triage and Remediation

Remediation

Using Console