Ensure RDS snapshots prohibit public access to maintain critical compliance standards.
Rule | RDS snapshots should prohibit public access |
Framework | PCI v3.2.1 |
Severity | ✔ Critical |
Rule Description
RDS (Relational Database Service) snapshots should prohibit public access to ensure compliance with Payment Card Industry Data Security Standard (PCI DSS) version 3. Publicly accessible RDS snapshots can expose sensitive data and increase the risk of unauthorized access, potentially resulting in a data breach.
Remediation Steps
To enforce this rule and restrict public access to RDS snapshots, follow the steps below:
Step 1: Access AWS Management Console
Step 2: Navigate to RDS Service
Step 3: Select the RDS Snapshot
Step 4: Modify Snapshot Permissions
Step 5: Remove Public Access
Troubleshooting
If you encounter any issues or if the changes are not applied as expected, consider the following troubleshooting steps:
rds:ModifyDBSnapshotAttribute
) to modify snapshot permissions. Contact your AWS account administrator or IAM administrator if needed.Code Example (AWS CLI)
You can also use the AWS Command Line Interface (CLI) to modify RDS snapshot permissions. Here's an example command:
aws rds modify-db-snapshot-attribute --region <region-name> --db-snapshot-identifier <snapshot-identifier> --attribute-name restore --values-to-add '[]' --values-to-remove Public
Replace
<region-name>
with the appropriate AWS region code and <snapshot-identifier>
with the identifier of the snapshot you want to modify.Make sure you have the AWS CLI installed and configured with appropriate credentials before executing the command.
Note
The exact steps and commands may vary depending on your AWS Management Console version, but the overall concepts and actions remain the same.