Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: RDS DB Instance Backup Should Be Enabled

This rule ensures that RDS DB instance backup is enabled for data protection and availability.

RuleRDS DB instance backup should be enabled
FrameworkSOC 2
Severity
Medium

Amazon RDS Backup Policy for SOC 2 Compliance

For organizations seeking SOC 2 compliance, it's crucial to ensure that your managed database services, such as Amazon Relational Database Service (RDS), are appropriately backed up. Backups serve as a safeguard against data loss, corruption, or disasters. This document outlines the necessary steps to enable and manage backups for Amazon RDS in compliance with SOC 2 requirements.

Enabling Automated Backups in Amazon RDS

Amazon RDS Automated Backups are critical for SOC 2 compliance as they provide a point-in-time snapshot and recoverability feature for your database instances.

Step-by-Step Guide for Enabling Automated Backups:

  1. 1.

    Login to AWS Management Console

    • Navigate to the RDS dashboard.
  2. 2.

    Select the RDS Instance

    • Choose the DB instance that you want to ensure is backed up.
  3. 3.

    Modify the Instance

    • Click on 'Instance Actions', then select 'Modify'.
  4. 4.

    Enable Automated Backups

    • Find the 'Backup' section.
    • Set the 'Backup Retention Period' to a value between 1 and 35 days, according to your organization’s backup policy.
  5. 5.

    Configure Backup Window

    • Choose a 'Backup Window' when the backups are to be taken.
  6. 6.

    Save Changes

    • Click on 'Continue' and check the option for 'Apply Immediately'.
    • Click on 'Modify DB Instance' to apply the changes.

Troubleshooting Backups

Possible Issues:

  • Backups Not Occurring: Check if the automated backups are enabled and check the scheduled window.
  • Backup Window Conflicts: Ensure the backup window does not conflict with high traffic or maintenance periods.

Remediation Steps:

  • Check Backup Settings: Ensure automated backups are enabled with an appropriate retention period.
  • Review CloudWatch Logs: Check for any error messages related to backup failures.
  • Modify Backup Window: If the window is during high traffic, reschedule to a lower activity period.

CLI Command for Enabling Automated Backups:

aws rds modify-db-instance \
    --db-instance-identifier <your-db-instance-identifier> \
    --backup-retention-period <desired-number-of-days> \
    --preferred-backup-window <hh24:mi-hh24:mi> \
    --apply-immediately

Replace

<your-db-instance-identifier>
with your RDS DB Instance Identifier,
<desired-number-of-days>
with the retention period, and
<hh24:mi-hh24:mi>
with your preferred backup window.

Implementing Snapshot Backups for Additional Security

In addition to automated backups, taking manual snapshots of the RDS instance can offer an extra layer of data protection.

Step-by-Step Guide:

  1. 1.

    Navigate to RDS Dashboard

  2. 2.

    Select the Instance

  3. 3.

    Take a Snapshot

    • Click on 'Instance Actions', select 'Take snapshot'.
    • Give the snapshot a recognizable identifier.
  4. 4.

    Monitor Snapshot Creation

    • Wait for the snapshot status to become 'available'.

CLI Command for Taking Snapshots:

aws rds create-db-snapshot \
    --db-instance-identifier <your-db-instance-identifier> \
    --db-snapshot-identifier <your-snapshot-identifier>

Replace

<your-db-instance-identifier>
with your DB instance identifier and
<your-snapshot-identifier>
with a unique name for the snapshot.

Conclusion

By following these steps and regularly reviewing your backup procedures, you can ensure your Amazon RDS instances have backups enabled, aiding in SOC 2 compliance. Keeping your backup and recovery strategies robust is a proactive measure against unforeseen data loss and contributes to maintaining a strong security posture.

Is your System Free of Underlying Vulnerabilities?
Find Out Now