This rule ensures RDS DB instances do not allow public access to enhance security measures.
Rule | RDS DB instances should prohibit public access |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
RDS DB instances should prohibit public access for NIST 800-53 Revision 5. This rule ensures that all RDS database instances are not accessible to the public. By implementing this measure, the organization can prevent unauthorized access to sensitive data stored in RDS DB instances, protecting the confidentiality and integrity of the information.
Troubleshooting Steps:
Verify the Security Group configuration:
Check the Subnet Group settings:
Verify the instance's parameter group configuration:
publicly_accessible
parameter is set to false
.Validate the Network Access Control Lists (NACLs) settings:
Rule Remediation:
To remediate this rule, follow the step-by-step guide below:
Identify the RDS DB instances that allow public access:
Modify the security group associated with the problematic RDS DB instance(s):
Move the RDS DB instance(s) to a private subnet:
Update the instance's parameter group settings:
publicly_accessible
parameter and set it to false
.Validate the Network Access Control Lists (NACLs):
Monitor and validate the changes:
Additional Notes: