Ensure RDS DB instances have encryption at rest enabled to enhance data security.
Rule | RDS DB instance encryption at rest should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description:
RDS DB instance encryption at rest should be enabled to adhere to the security requirements specified in the NIST 800-53 Revision 5 standard.
Troubleshooting Steps:
If RDS DB instance encryption at rest is not enabled, follow the troubleshooting steps below:
Necessary Codes:
There are no specific codes to be provided as enabling encryption at rest for RDS DB instances depends on the specific cloud provider's services and configurations.
Step-by-Step Guide for Remediation:
Amazon Web Services (AWS):
To enable encryption at rest for an RDS DB instance on AWS, follow these steps:
Google Cloud Platform (GCP):
To enable encryption at rest for an RDS DB instance on GCP, follow these steps:
Microsoft Azure:
To enable encryption at rest for an RDS DB instance on Microsoft Azure, follow these steps:
Note: The above steps are for reference purposes and may vary depending on the cloud provider's interfaces and updates. Please consult the respective cloud provider's documentation for detailed and up-to-date instructions.
Conclusion:
Enabling RDS DB instance encryption at rest is crucial to ensure compliance with the NIST 800-53 Revision 5 standard. By following the step-by-step guides tailored for different cloud providers, you can successfully enable encryption at rest for your RDS DB instances and enhance the security of your database environment.