This rule ensures that RDS snapshots do not allow public access, enhancing security measures.
Rule | RDS snapshots should prohibit public access |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Critical |
Rule Description
RDS snapshots should prohibit public access to comply with NIST 800-53 Revision 5 security standard. This rule ensures that the snapshots of your Amazon Relational Database Service (RDS) instances are not accessible by unauthorized users or the public internet. By restricting public access to RDS snapshots, you can prevent potential security breaches and safeguard sensitive data.
Enforcing this rule will provide additional layers of protection for your database backups and assist in meeting compliance requirements.
Troubleshooting Steps (if applicable)
Necessary Code (if applicable)
No code is necessary for this rule. Configuration changes will be made using AWS Management Console or AWS Command Line Interface (CLI).
Remediation Steps
Follow these step-by-step instructions to remediate the RDS snapshot public access issue:
Open the AWS Management Console and navigate to the Amazon RDS service.
Select the appropriate region from the region selector in the upper-right corner of the console.
Click on "Snapshots" in the left-hand navigation pane.
Identify the target snapshot that needs remediation and click on its name.
In the snapshot details page, check the "Permissions" section to verify if the snapshot is publicly accessible.
If the snapshot is publicly accessible, click on the "Modify" button in the upper-right corner of the page.
In the Modify Snapshot Permissions dialog box, scroll down to the "Share" section.
Remove any entries in the "Public" field by clicking on the "X" icon beside them.
Ensure that only approved AWS accounts or IAM users/roles with appropriate permissions are listed in the "Account ID" or "IAM User" fields respectively.
Click on the "Save Changes" button to apply the modifications.
After saving the changes, verify that the snapshot's permissions have been successfully updated and are no longer publicly accessible.
Repeat the above steps for any other snapshots that require remediation.
Additional Recommendations