This rule ensures RDS snapshots do not allow public access to maintain data security.
Rule | RDS snapshots should prohibit public access |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Critical |
Rule Description:
This rule ensures that RDS snapshots in an AWS account are not publicly accessible. It specifically focuses on meeting the requirements set forth by FedRAMP (Federal Risk and Authorization Management Program) for systems categorized as "FedRAMP Low" in Revision 4.
Troubleshooting Steps:
Necessary Codes:
No specific codes are required for this rule, as it primarily involves configuration settings and access controls within the AWS account.
Step by Step Guide for Remediation:
1. Identify publicly accessible RDS snapshots:
To identify RDS snapshots that are publicly accessible, you can use the AWS Command Line Interface (CLI) by following these steps:
a. Install and configure AWS CLI:
aws configure
command and providing your Access Key ID, Secret Access Key, default region, and output format.b. List all RDS snapshots and check their accessibility:
aws rds describe-db-snapshots
2. Update RDS snapshot accessibility:
To remediate the issue and modify the accessibility of the RDS snapshots, follow these steps:
a. Identify the snapshots to modify:
b. Modify the snapshot accessibility:
aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-identifier> --no-publicly-accessible
Replace
<snapshot-identifier>
with the actual identifier of the snapshot you want to modify.Summary:
By following the troubleshooting steps and remediation guide provided above, you can ensure that RDS snapshots in your AWS account are not publicly accessible. This ensures compliance with the specified FedRAMP Low Revision 4 policy. Remember to regularly review and monitor the accessibility settings for your RDS snapshots to maintain compliance.