This rule ensures that RDS snapshots do not have public access to maintain data security.
Rule | RDS snapshots should prohibit public access |
Framework | CISA-cyber-essentials |
Severity | ✔ Critical |
Rule Description: RDS Snapshots should prohibit public access for CISA Cyber Essentials.
Description:
RDS (Relational Database Service) is a managed database service provided by Amazon Web Services (AWS) that allows users to set up, operate, and scale a relational database in the cloud. RDS Snapshots are backups of your RDS databases that can be used for restoring data or creating new databases.
To comply with the CISA (Cybersecurity and Infrastructure Security Agency) Cyber Essentials requirements, it is crucial to ensure that RDS snapshots do not have public access. Allowing public access to RDS snapshots increases the risk of unauthorized access to sensitive data or potential compromise of the database.
Troubleshooting Steps:
Check RDS Snapshots:
Verify Public Access Permissions:
Validate Security Group Settings:
Review Network ACLs:
Necessary Codes:
The necessary codes depend on the existing configurations and the desired changes. However, the following example shows how to update the snapshot permissions using the AWS Command Line Interface (CLI):
aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-identifier> --attribute-name restore --values-to-add all --values-to-remove public
This command modifies the attribute of the specified RDS snapshot and removes public access while allowing access to all AWS accounts within the same region.
Remediation Steps:
Identify and Validate RDS Snapshots:
Update Permissions:
Verify Changes:
Repeat for Other Snapshots:
Monitor and Maintain:
Note: Please ensure that you thoroughly understand the AWS CLI commands and their potential impact before executing them in your environment. Adjust the commands as necessary based on your specific requirements and configurations.