This rule ensures that RDS Aurora clusters are protected by a backup plan for data recovery and security.
Rule | RDS Aurora clusters should be protected by backup plan |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Rule Description:
RDS Aurora clusters should be protected by a backup plan for NIST Cybersecurity Framework (CSF) v1. This rule ensures the implementation of a backup strategy for Aurora database clusters, which is crucial for data protection and disaster recovery purposes. The NIST Cybersecurity Framework provides guidelines for organizations to manage and secure their information systems effectively.
Troubleshooting Steps:
If a backup plan is not in place for RDS Aurora clusters, the following troubleshooting steps can be taken:
Check the current backup policy: Verify the backup policy for the Aurora cluster by reviewing the RDS cluster settings in the AWS Management Console or using the AWS Command Line Interface (CLI) command:
aws rds describe-db-clusters --db-cluster-identifier <cluster-identifier>
.Verify backup retention period: Ensure that the backup retention period aligns with the organization's requirements. The retention period specifies how long automated backups are retained before being deleted. It can be modified using the AWS Management Console or the CLI command:
aws rds modify-db-cluster --db-cluster-identifier <cluster-identifier> --backup-retention-period <days>
.Confirm automated backups: Check if automated backups are enabled for the Aurora cluster. If not, enable them using the AWS Management Console or the CLI command:
aws rds modify-db-cluster --db-cluster-identifier <cluster-identifier> --backup-retention-period <days>
.Configure a backup window: Ensure that a preferred backup window is set to avoid disrupting critical operations during backup periods. The backup window can be configured using the AWS Management Console or the CLI command:
aws rds modify-db-cluster --db-cluster-identifier <cluster-identifier> --preferred-backup-window <window>
. Replace <window>
with the desired backup window timeframe.Test backup and restore procedures: Periodically test the backup and restore procedures to ensure they work effectively. Create a test environment using a copy of the production Aurora cluster and restore data from a backup to verify its integrity.
Necessary Codes:
The following AWS CLI commands can be utilized to configure backup settings for an RDS Aurora cluster:
aws rds modify-db-cluster --db-cluster-identifier <cluster-identifier> --backup-retention-period <days>
Replace
<cluster-identifier>
with the identifier of the Aurora cluster and <days>
with the desired number of days to retain backups.aws rds modify-db-cluster --db-cluster-identifier <cluster-identifier> --backup-retention-period <days>
Use the same placeholders as mentioned above.
aws rds modify-db-cluster --db-cluster-identifier <cluster-identifier> --preferred-backup-window <window>
Replace
<cluster-identifier>
with the identifier of the Aurora cluster and <window>
with the preferred backup window timeframe.Step-by-Step Guide for Remediation:
Follow the steps below to remediate the rule violation for protecting RDS Aurora clusters with a backup plan:
Assess the current backup policy:
Set the backup retention period:
Enable automated backups:
Configure a preferred backup window:
Test backup and restore procedures:
By following these steps and ensuring the backup plan aligns with the NIST Cybersecurity Framework guidelines, you can successfully protect RDS Aurora clusters with an appropriate backup strategy.