This rule ensures that RDS snapshots do not allow public access to prevent unauthorized users from accessing sensitive data.
Rule | RDS snapshots should prohibit public access |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Critical |
Rule Description:
This rule ensures that RDS (Relational Database Service) snapshots are not publicly accessible. Specifically, this rule applies to RDS snapshots within an AWS account that are subject to compliance with the FedRAMP Low requirements, specifically Revision 4.
Reasoning:
Prohibiting public access to RDS snapshots enhances the security and confidentiality of the data stored in the database backups. Allowing public access increases the risk of unauthorized access and potential data breaches. Compliance with the FedRAMP Low requirements ensures the implementation of necessary security measures for protecting sensitive information.
Steps to troubleshoot if public access is enabled:
Remediation Steps:
To remediate and prohibit public access for the affected RDS snapshot, follow these steps:
Method 1: Using the AWS Management Console
Method 2: Using AWS CLI (Command Line Interface)
aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-identifier> --attribute-name restore --values-to-add <your-aws-account-id>
Replace
<snapshot-identifier>
with the identifier of the RDS snapshot and <your-aws-account-id>
with your AWS account ID.Additional Notes: