This rule ensures that RDS snapshots do not have public access, critical for data protection.
Rule | RDS snapshots should prohibit public access |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Critical |
Rule Description
This rule is intended to enforce the security best practice of prohibiting public access to RDS snapshots. Publicly accessible RDS snapshots can pose a significant security risk by exposing sensitive data to unauthorized access. This rule aligns with the recommendations outlined in the NIST Cybersecurity Framework (CSF) version 1.
Troubleshooting Steps
If public access to RDS snapshots is allowed, it could indicate a misconfiguration in the AWS RDS settings. To troubleshoot and remediate the issue, follow the steps below:
Necessary Codes
There are no specific codes applicable to this rule as it deals with the configuration and permissions of RDS snapshots rather than code implementation.
Step-by-Step Guide for Remediation
To remediate the rule violation and prohibit public access to RDS snapshots, perform the following steps:
By following these steps, you can successfully remediate the violation and enforce the policy of prohibiting public access to RDS snapshots, thus aligning with the NIST CSF v1 recommendations.