This rule ensures that RDS DB instances do not allow public access, maintaining data security.
Rule | RDS DB instances should prohibit public access |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description
According to NIST 800-171 Revision 2, RDS DB instances should prohibit public access. Public access to the database instances can increase the risk of unauthorized access, data breaches, and potential security vulnerabilities. It is important to ensure that the RDS DB instances are only accessible by authorized users and resources.
Troubleshooting Steps
Step 1: Verify the RDS DB instance's network settings
Step 2: Check the security group associated with the RDS DB instance
Step 3: Review the security group settings
Step 4: Ensure there are no public access rules
Step 5: Verify the accessibility of the RDS DB instance
Code Samples
There are no specific code snippets required for this rule as it involves checking and configuring the network and security settings using the AWS Management Console.
Remediation Steps
To remediate the public access issue for an RDS DB instance:
NOTE: It is recommended to follow the principle of least privilege when configuring the security group rules by allowing access only from specific trusted sources, such as specific IP addresses or security groups.