This rule ensures that RDS DB Instances do not allow public access for critical security measures.
Rule | RDS DB Instances should prohibit public access |
Framework | PCI v3.2.1 |
Severity | ✔ Critical |
Description:
The rule states that RDS (Amazon Relational Database Service) DB instances should prohibit public access to ensure compliance with the Payment Card Industry Data Security Standard (PCI DSS) version 3. This is necessary to protect sensitive payment card information and prevent unauthorized access to the database.
Public access refers to the ability to access the RDS DB instance from the internet without any restrictions. It is important to restrict public access to only authorized and secure networks to maintain the confidentiality, integrity, and availability of PCI data.
Troubleshooting Steps:
Necessary Codes:
There are no specific codes for this rule. The changes required can be made through the AWS Management Console or AWS Command Line Interface (CLI).
Remediation Steps:
The following steps outline the process to remediate this issue:
Alternatively, you can use the AWS CLI to modify the RDS DB instance:
aws rds modify-db-instance --db-instance-identifier <db-instance-id> --publicly-accessible false
Replace
<db-instance-id>
with the identifier of the RDS DB instance.Note: Make sure you have the necessary permissions to modify the RDS DB instance and associated security groups.
Verification:
To verify if the RDS DB instance no longer allows public access:
By following these steps, you have successfully prohibited public access to the RDS DB instance, ensuring compliance with PCI DSS v3.