This rule ensures that RDS DB instances are safeguarded by a backup plan to prevent data loss.
Rule | RDS DB instance should be protected by backup plan |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ High |
RDS DB Instance Backup Compliance with NIST Cybersecurity Framework
Amazon Relational Database Service (RDS) is a managed database service that simplifies the setting up, operating, and scaling of a relational database in the cloud. Adhering to the guidelines of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is imperative for maintaining the integrity and availability of database information. A robust backup strategy is a significant part of this framework.
NIST Cybersecurity Framework Overview
The NIST CSF provides a policy framework of computer security guidance for organizations to assess and improve their ability to prevent, detect, and respond to cyber-attacks. It includes categories such as Identify, Protect, Detect, Respond, and Recover. Under Protect function, maintaining robust backup plans is crucial for Recovery Planning (PR.IP-4).
Rule Details: RDS Backup
As per the rule derived from NIST CSF, your RDS instances should have:
Troubleshooting Steps for Backup Compliance
Verify Snapshot Settings: Ensure that your RDS instances have automated snapshots set up.
Check Retention Policies: Confirm that the snapshot retention period meets or exceeds the desired compliance period.
Test Backup Restoration: Regularly test backups to ensure that they can be restored in compliance with your recovery objectives.
Encryption: Verify that snapshots are encrypted to ensure data is protected at rest.
Code for Automated Compliance Checks
AWS CLI commands and AWS SDKs can be used to automate the compliance check process.
# Check if automated backups are enabled for RDS instances aws rds describe-db-instances --query 'DBInstances[*].[DBInstanceIdentifier,BackupRetentionPeriod,StorageEncrypted]' # Modify the retention period of an RDS DB instance aws rds modify-db-instance --db-instance-identifier <YourDBInstanceIdentifier> --backup-retention-period <DesiredRetentionPeriod> --apply-immediately
Make sure to replace
<YourDBInstanceIdentifier>
with your actual RDS DB instance identifier and <DesiredRetentionPeriod>
with the number of days you want to retain backups.Remediation Guide
Setting Up Automated Snapshots
Increasing Backup Retention Period
If the retention period is less than the required compliance period, increase it:
Ensuring Snapshots Are Encrypted
Following these detailed yet precise steps will ensure that your RDS DB instances comply with the backup requirements set by the NIST Cybersecurity Framework. Regular compliance audits and immediate remediation steps will significantly contribute to the security and resilience of your AWS database services.