Ensure compliance by enabling backup for RDS DB instances.
Rule | RDS DB instance backup should be enabled |
Framework | SOC 2 |
Severity | ✔ Medium |
Rule Description
The rule ensures that backup is enabled for Amazon Relational Database Service (RDS) instances in order to comply with SOC 2 requirements. Enabling backups for RDS instances helps to protect your critical database and ensures that you can recover in case of data loss or system failure.
Troubleshooting Steps
Necessary Code
There is no specific code snippet required for this rule. The backup feature is available as a built-in functionality of Amazon RDS and can be enabled directly through the AWS Management Console or via the CLI.
Remediation Steps
AWS Management Console
AWS CLI
aws rds modify-db-instance --db-instance-identifier [RDS_INSTANCE_IDENTIFIER] --backup-retention-period [NUMBER_OF_DAYS]
Replace
[RDS_INSTANCE_IDENTIFIER]
with the ID or name of the RDS instance you want to modify, and [NUMBER_OF_DAYS]
with the desired backup retention period in days.Example:
aws rds modify-db-instance --db-instance-identifier my-rds-instance --backup-retention-period 7
This command enables backup for the RDS instance "my-rds-instance" with a backup retention period of 7 days.
Note
Enabling backup for RDS instances incurs extra costs associated with storing and maintaining backups. Make sure to consider these costs and review the backup strategy based on your business requirements and compliance needs.