Ensure public access is disabled for Amazon Relational Database Service (Amazon RDS) database snapshots

MEDIUM

Description

Allowing unrestricted, public access to cloud services could open an application up to external attack. Disallowing this access is typically considered best practice.

Remediation

In AWS Console -

  1. Sign in to AWS Console and go to Amazon RDS console.
  2. Select Snapshots in navigation pane.
  3. Click on the public tab to view the public instances.

In Terraform -

  1. In the aws_db_snapshot resource, set snapshot_type to some value other than public or shared. Available options are automated, manual, and awsbackup.

References:
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/db_snapshot

Policy Details

Rule Reference ID: AC_AWS_0437
CSP: AWS
Remediation Available: Yes
Resource: aws_db_snapshot
Resource Category: Database
Resource Type: DB Instance

Frameworks