This rule specifies the requirement for configuring IAM authentication for RDS clusters.
Rule | IAM authentication should be configured for RDS clusters |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description:
IAM authentication should be configured for RDS clusters in order to comply with the security requirements of NIST 800-171 Revision 2. This rule ensures that only authorized users or services with appropriate IAM roles can access the RDS clusters, providing an additional layer of security and access control.
Troubleshooting Steps:
If IAM authentication is not enabled for RDS clusters, follow these troubleshooting steps to resolve the issue:
Check if the RDS cluster is already enabled for IAM authentication:
Enable IAM authentication for the RDS cluster:
Verify IAM authentication for the RDS cluster:
Test IAM authentication:
Necessary Codes:
There are no specific codes required to enable IAM authentication for RDS clusters. The configuration can be done entirely through the Amazon RDS Management Console or via AWS CLI commands.
Step-by-Step Guide for Remediation:
Enable IAM authentication for an RDS cluster using the AWS Management Console:
Enable IAM authentication for an RDS cluster using AWS CLI:
Replaceaws rds modify-db-cluster --db-cluster-identifier <cluster-identifier> --enable-iam-database-authentication
<cluster-identifier>
with the actual identifier of the RDS cluster.Verify if IAM authentication is enabled:
Test IAM authentication:
By following these steps, IAM authentication can be successfully configured for RDS clusters, meeting the NIST 800-171 Revision 2 requirements.