This rule ensures that RDS snapshots do not have public access for critical data protection.
Rule | RDS snapshots should prohibit public access |
Framework | HIPAA |
Severity | ✔ Critical |
Rule Description:
RDS snapshots should prohibit public access to ensure compliance with the Health Insurance Portability and Accountability Act (HIPAA). HIPAA requires the protection of sensitive health information and mandates that any access to this data should be restricted to authorized individuals or entities.
Troubleshooting Steps (if applicable):
Necessary Code (if applicable):
To restrict public access to RDS snapshots, you can use the AWS Command Line Interface (CLI) or AWS Management Console.
AWS CLI Command:
aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-identifier> --attribute-name `restore` --values-to-add <AWS-account-ID>
Replace
<snapshot-identifier>
with the identifier of the RDS snapshot that needs modification, and <AWS-account-ID>
with the AWS account ID of the authorized user or entity.AWS Management Console:
Remediation Steps:
Follow these step-by-step instructions to remediate the RDS snapshot and enforce the prohibition of public access:
By following these steps, you ensure that RDS snapshots maintain compliance with HIPAA regulations by prohibiting public access.