This rule ensures that RDS DB instances do not allow public access for security purposes.
Rule | RDS DB instances should prohibit public access |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description:
RDS (Amazon Relational Database Service) DB instances should prohibit public access in order to comply with NIST 800-171 Revision 2 guidelines. This rule ensures that the DB instances are not accessible from the internet, reducing the risk of unauthorized access and potential security breaches.
Troubleshooting Steps:
If public access to the RDS DB instances is detected, follow the troubleshooting steps below to remediate the issue:
Necessary Codes:
There are no specific codes for this rule, as it primarily involves adjusting the network and security group configurations. However, you may need to use AWS CLI (Command Line Interface) or AWS Management Console to perform the necessary tasks.
Step-by-Step Guide:
Follow the step-by-step guide below to remediate the public access issue for RDS DB instances:
By following these steps, you will secure your RDS DB instances by prohibiting public access, thus ensuring compliance with NIST 800-171 Revision 2 guidelines.