π‘οΈ AWS GuardDuty Detector RDS Protection is not enabledπ’
- Contextual name: π‘οΈ Detector RDS Protection is not enabledπ’
- ID:
/ce/ca/aws/guardduty/detector-rds-protection - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [GuardDuty.9] GuardDuty RDS Protection should be enabled
Descriptionβ
Descriptionβ
This policy identifies AWS GuardDuty Detectors that do not have RDS Protection enabled.
RDS Protection in Amazon GuardDuty analyzes and profiles login activity for potential access threats to your Amazon Aurora databases (MySQL- and PostgreSQL-compatible editions) and Amazon RDS for PostgreSQL instances.
Rationaleβ
GuardDuty RDS Protection monitors and analyzes RDS login activity to detect potential threats. It identifies suspicious login behaviors, such as an unusually high number of failed login attempts or successful logins from unfamiliar locations or known malicious IP addresses.
Impactβ
Charges for GuardDuty RDS Protection are based on the number of protected RDS provisioned instance vCPUs per month.
Auditβ
This policy flags an AWS GuardDuty Detector as
INCOMPLIANTif the RDS_LOGIN_EVENTSFeatureis not set to ENABLED.
Remediationβ
Remediationβ
Enable RDS Protectionβ
For Multi-Account Environmentsβ
In a multi-account environment, only the delegated GuardDuty administrator account can enable or disable RDS Protection for member accounts. Member accounts cannot modify this configuration directly.
From Command Lineβ
aws guardduty update-member-detectors \
--detector-id {{detector-id}} \
--account-ids {{account-id1}} {{account-id2}} \
--region {{region}} \
--features 'Name=RDS_LOGIN_EVENTS,Status=ENABLED'The delegated administrator can also automatically enable RDS Protection for all and new accounts as they join the organization.
aws guardduty update-organization-configuration \
--detector-id {{detector-id}} \
--region {{region}} \
--features 'Name=RDS_LOGIN_EVENTS,AutoEnable={{NEW | ALL}}'
For a Standalone Accountβ
If your account is not associated with a delegated GuardDuty administrator via AWS Organizations, enable RDS Protection directly:
aws guardduty update-detector \
--detector-id {{detector-id}} \
... [see more](remediation.md)