Ensures DMS replication instances are not publicly accessible, maintaining secure network configuration.
Rule | Database Migration Service replication instances should not be public |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ Critical |
Description
Replication instances of the Database Migration Service should not be set to public in order to adhere to the AWS Foundational Security Best Practices. Allowing public access to replication instances can expose sensitive data and make them vulnerable to unauthorized access, potentially leading to security breaches. It is essential to ensure that replication instances are kept private to maintain the confidentiality and integrity of the data being migrated.
Troubleshooting Steps
If a replication instance is mistakenly set to public, follow the below steps to rectify the issue:
Remediation Steps
To remediate the issue of a public replication instance, follow the given steps:
Conclusion
Maintaining the Database Migration Service replication instances as private is crucial for ensuring the security and protection of data during migration processes. By following the recommended remediation steps, organizations can prevent unauthorized access and potential security risks associated with public replication instances.