This rule ensures that RDS DB snapshots are encrypted to maintain data security.
Rule | RDS DB snapshots should be encrypted at rest |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description:
RDS DB snapshots should be encrypted at rest to comply with the security requirement outlined in NIST 800-53 Revision 5. Encrypting DB snapshots adds an additional layer of protection to the data stored in the RDS database.
Troubleshooting Steps:
Necessary Codes:
There are no specific codes required for this rule. However, you can use the AWS Command Line Interface (CLI) to configure the encryption for RDS DB snapshots.
Step-by-Step Guide for Remediation:
1. Verify Encryption Setting:
2. Check Automatic DB Snapshot Feature:
3. Grant Necessary Permissions:
CLI Command for Encryption:
You can use the AWS CLI to enable encryption for RDS DB snapshots. Here's an example command:
aws rds modify-db-instance \ --db-instance-identifier <instance-id> \ --enable-storage-encryption \ --apply-immediately
Make sure to replace
<instance-id>
with the actual identifier of your RDS instance.Summary:
By following the provided steps, you can comply with the NIST 800-53 Revision 5 requirement and ensure that RDS DB snapshots are encrypted at rest. Regularly verify the encryption settings and ensure that automated backups are enabled to maintain a secure environment for your RDS databases.