This rule ensures RDS snapshots are secured by prohibiting public access.
Rule | RDS snapshots should prohibit public access |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Critical |
Rule Description
This rule ensures that RDS snapshots in AWS do not have public access, which aligns with the NIST 800-53 Revision 5 security control recommendations. Publicly accessible RDS snapshots may expose sensitive data to unauthorized users, leading to potential security breaches.
Troubleshooting Steps
In case you encounter issues related to public access for RDS snapshots, consider following these troubleshooting steps:
Necessary Codes
No specific codes are required for this rule. However, you may need to use AWS CLI commands to verify and modify the settings for RDS snapshots and associated resources.
Remediation Steps
Follow these step-by-step instructions to remediate the public access issue for RDS snapshots:
Identify the RDS snapshot: Determine the specific RDS snapshot that needs to have public access prohibited.
Modify the snapshot's permissions:
Verify changes:
Review associated resources:
Repeat for other affected snapshots:
By following these steps, you can ensure that RDS snapshots prohibit public access and comply with the NIST 800-53 Revision 5 security control recommendations.