This rule ensures that RDS DB instances do not allow public access to enhance security measures.
Rule | RDS DB instances should prohibit public access |
Framework | SOC 2 |
Severity | ✔ High |
RDS DB instance Public Access Prohibition for SOC 2
Description:
RDS (Relational Database Service) DB instances that store sensitive data should prohibit public access to comply with SOC 2 (Service Organization Controls 2) standards. Public access exposes the database to potential security risks, unauthorized access, and data breaches. Restricting public access helps maintain the confidentiality, integrity, and availability of data stored in the RDS DB instances.
Troubleshooting Steps:
If public access is mistakenly enabled for an RDS DB instance, follow the steps below to remediate the issue:
Necessary Codes:
There are no specific codes required for this rule as it involves modifying the security group settings through the AWS Management Console. However, if you prefer to use the AWS Command Line Interface (CLI) for the remediation steps, the following commands can be used:
aws rds modify-db-instance \ --db-instance-identifier <instance-identifier> \ --publicly-accessible false
Step-by-Step Guide for Remediation:
By following these steps, public access will be prohibited for the RDS DB instance, aligning with the SOC 2 standard requirements.