Ensure that RDS snapshots do not allow public access to maintain data security.
Rule | RDS snapshots should prohibit public access |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Critical |
Rule Description: RDS (Relational Database Service) snapshots should have public access prohibited, following the guidelines set by NIST 800-171 Revision 2. This rule ensures that sensitive data stored in RDS snapshots is not accessible to unauthorized individuals or entities over public networks.
Troubleshooting Steps:
Remediation Steps:
Identify Affected RDS Snapshots: Determine which RDS snapshots are currently allowing public access and need to be modified.
Modify Snapshot Access Permissions: Update the permissions of the identified snapshots to prohibit public access. This can be done through the AWS Management Console, AWS CLI, or SDKs.
AWS Management Console:
AWS CLI Command:
Replaceaws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-identifier> --no-publicly-accessible
<snapshot-identifier>
with the identifier of the RDS snapshot that needs to be modified.Repeat Step 4 for all affected RDS snapshots.
Note: Ensure that only authorized users or entities have access to the RDS snapshots by properly configuring network ACLs and security group rules. Regularly monitor and review the configuration to maintain compliance with the NIST 800-171 Revision 2 guidelines.