Checks if Amazon Redshift clusters are configured to prohibit public access, preventing unauthorized external connections.
Rule | Amazon Redshift clusters should prohibit public access |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ Critical |
Description
Amazon Redshift clusters should be configured to prohibit public access in order to adhere to AWS Foundational Security Best Practices. Allowing public access to Redshift clusters can expose sensitive data and resources to unauthorized access and potential security breaches.
Troubleshooting Steps
If public access has been inadvertently enabled for an Amazon Redshift cluster, the following steps can be taken to remediate the issue:
Necessary Codes
If necessary, the following AWS CLI command can be used to update the security group rules for an Amazon Redshift cluster:
aws redshift authorize-cluster-security-group-ingress --cluster-security-group-name <security-group-name> --cidr <CIDR block> --protocol <protocol> --port <port>
Step-by-Step Guide for Remediation
<security-group-name>
with the name of the Redshift cluster's security group.<CIDR block>
of the authorized IP range that should have access to the cluster.<protocol>
and <port>
that will be allowed for inbound traffic.Following these steps will help to ensure that public access to the Amazon Redshift cluster is prohibited, aligning with AWS Foundational Security Best Practices.