This rule focuses on preventing public access to RDS DB instances for security purposes.
Rule | RDS DB instances should prohibit public access |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ High |
RDS Database Instances Public Access Prohibition for NIST Cybersecurity Framework (CSF) v1
Description
The NIST Cybersecurity Framework (CSF) v1 outlines a comprehensive set of guidelines and best practices for maintaining robust cybersecurity measures. One crucial aspect of ensuring the security of your AWS RDS (Relational Database Service) is to prohibit public access to your database instances. Publicly accessible RDS instances may pose a significant risk, allowing potential unauthorized access to sensitive data and exposing your systems to potential security breaches.
To adhere to the CSF v1 recommendations and enhance the security posture of your RDS database instances, it is necessary to enforce the prohibition of public access.
Troubleshooting
The following steps can be taken for troubleshooting the public access prohibition for RDS database instances:
Verify the RDS instance settings:
Check network access settings:
Utilize AWS Advisor:
Remediation
To enforce the prohibition of public access to your RDS database instances for compliance with the NIST CSF v1, follow the step-by-step guide below:
Identify publicly accessible RDS instances:
Verify instance accessibility:
Modify security group rules:
Remove public access rules:
Adjust network settings:
Ensure direct connectivity restrictions:
Monitor and test:
Additional Tips
Note: The remediation steps mentioned above are generic and may vary depending on your specific AWS infrastructure setup and RDS instance configuration. Always refer to the official AWS documentation for detailed instructions.