This rule ensures that RDS DB instance and cluster enhanced monitoring is enabled for better performance and security.
Rule | RDS DB instance and cluster enhanced monitoring should be enabled |
Framework | CISA-cyber-essentials |
Severity | ✔ High |
Rule Description:
Enabling enhanced monitoring for Amazon RDS DB instances and clusters is a recommended security practice, especially for organizations following the CISA Cyber Essentials guidelines. Enhanced monitoring provides detailed insights into the performance of your RDS resources, helping you identify and mitigate potential security risks promptly.
Troubleshooting Steps:
If you encounter any issues while enabling enhanced monitoring for RDS DB instances and clusters, follow these troubleshooting steps:
Check IAM Roles: Ensure that the IAM role attached to your RDS instances has the necessary permissions to enable enhanced monitoring. The role should have the "rds:EnableEnhancedMonitoring" action allowed.
Verify DB Instance Compatibility: Enhanced monitoring is supported for specific database engine versions and instance classes. Confirm that your RDS DB instances meet the required compatibility criteria.
Check Network Connectivity: Ensure that your RDS instances have network connectivity to the required AWS endpoints. This is necessary for enabling enhanced monitoring and sending metric data to CloudWatch.
Verify CloudWatch Agent Installation: Enhanced monitoring relies on the CloudWatch agent running on your instances. Verify that the agent is correctly installed and running without any issues.
Necessary Codes:
To enable enhanced monitoring for RDS DB instances and clusters programmatically, you can use the AWS Command Line Interface (CLI) with the following command:
aws rds modify-db-instance --db-instance-identifier <instance-identifier> --monitoring-interval <interval-in-seconds> --monitoring-role-arn <IAM-role-ARN>
Replace
<instance-identifier>
with the identifier of your RDS DB instance, <interval-in-seconds>
with the desired monitoring interval (interval between data points), and <IAM-role-ARN>
with the ARN of the IAM role that grants permissions for enhanced monitoring.Step-by-Step Guide for Remediation:
Log in to the AWS Management Console.
Go to the Amazon RDS service.
Click on "DB Instances" or "Clusters" from the left-hand menu, depending on whether you want to enable enhanced monitoring for individual instances or clusters.
Select the specific DB instance or cluster that you want to enable enhanced monitoring for.
Click the "Actions" button and choose "Modify" from the dropdown menu.
In the "Enhanced Monitoring" section, select the desired monitoring interval from the dropdown list.
Choose the IAM role you want to associate with enhanced monitoring from the "Monitoring Role ARN" dropdown.
Click "Continue" and review the summary of modifications.
If everything looks correct, click "Modify DB Instance" or "Modify Cluster" to apply the changes.
Monitor the modifications in the "Events" tab to ensure successful completion.
Congratulations! You have successfully enabled enhanced monitoring for your RDS DB instances or clusters following the CISA Cyber Essentials guidelines. This will provide in-depth performance monitoring capabilities and contribute to the security of your infrastructure.