This rule ensures RDS database does not have unrestricted security group attached.
Rule | Ensure RDS database does not have unrestricted security group attached |
Framework | CloudDefense.AI Security |
Severity | ✔ Critical |
Description
The rule ensures that an AWS RDS (Relational Database Service) database does not have an unrestricted security group attached to it. An unrestricted security group allows all traffic, from any source, to access the database. This poses a significant security risk as it may result in unauthorized access or potential data breaches.
Troubleshooting
In case an unrestricted security group is found attached to the RDS database, follow the steps below for remediation.
Remediation Steps
Step 1: Identify the RDS Database
Step 2: Check Security Groups
Step 3: Review Security Groups
Step 4: Remove Unrestricted Security Group
Step 5: Update Security Group rules
If Inbound rule needs modification:
If Outbound rule needs modification:
Code
No specific code is required for this rule, as the remediation steps involve modifying security group rules through the AWS Management Console.
It is recommended to automate these steps using AWS CLI or SDKs for large-scale environments or as part of a continuous security monitoring process.