This rule ensures that RDS DB instances do not allow public access to enhance security measures.
Rule | RDS DB instances should prohibit public access |
Framework | GxP 21 CFR Part 11 |
Severity | ✔ High |
Rule Description
RDS (Amazon Relational Database Service) DB instances should be configured to prohibit public access in order to comply with the requirements of GxP (Good Practice for Pharmaceutical) 21 CFR (Code of Federal Regulations) Part 11. This ensures that the DB instances hosting sensitive data are not accessible to unauthorized entities over the public internet.
Troubleshooting Steps
If public access is detected for RDS DB instances hosting GxP data, perform the following steps to troubleshoot and enforce the required security configuration:
Necessary Codes
Certain code snippets may be helpful in enforcing the required configuration:
aws rds modify-db-instance \ --db-instance-identifier <db-instance-identifier> \ --vpc-security-group-ids <security-group-ids>
Replace
<db-instance-identifier>
with the relevant DB instance identifier and <security-group-ids>
with the desired security group IDs.aws ec2 revoke-security-group-ingress \ --group-id <security-group-id> \ --protocol tcp \ --port <port-number> \ --cidr 0.0.0.0/0
Replace
<security-group-id>
with the actual security group ID associated with the RDS DB instance, and <port-number>
with the appropriate port number used by the database engine.Remediation Steps
Follow these step-by-step instructions to remediate the RDS DB instances and ensure public access is prohibited:
aws rds modify-db-instance \ --db-instance-identifier <db-instance-identifier> \ --vpc-security-group-ids <security-group-ids>
Replace
<db-instance-identifier>
with the actual DB instance identifier and <security-group-ids>
with the desired security group ID(s). Ensure that the designated security group only allows access from authorized sources.aws ec2 revoke-security-group-ingress \ --group-id <security-group-id> \ --protocol tcp \ --port <port-number> \ --cidr 0.0.0.0/0
Replace
<security-group-id>
with the actual security group ID associated with the RDS DB instance, and <port-number>
with the appropriate port number used by the database engine.By following these steps, you will successfully configure RDS DB instances to prohibit public access, ensuring compliance with GxP 21 CFR Part 11 regulations.