π AWS RDS Aurora Cluster access is not consistent π’
- Contextual name: π Aurora Cluster access is not consistent π’
- ID:
/ce/ca/aws/rds/aurora-cluster-access-consistency
- Located in: π AWS RDS
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
RELIABILITY
SECURITY
Similar Policiesβ
- AWS Trusted Advisor
- [xuy7H1avtl](Amazon Aurora DB Instance Accessibility (https://docs.aws.amazon.com/awssupport/latest/user/fault-tolerance-checks.html#amazon-aurora-db-instance-accessibility)]
- Cloud Conformity
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Ensure that all database instances within your Amazon Aurora clusters have consistent accessibility settings, either all public or all private, in alignment with the Fault-Tolerance AWS best practices. This practice ensures seamless connectivity and optimal failover performance for your Aurora clusters.
Rationalβ
It is highly recommended to have all the database instances running within an Aurora cluster as either publicly or privately accessible because in case of a failover, an instance might go from publicly accessible to privately accessible and obstruct the connectivity to the database cluster.
In the event of a failover, the accessibility setting (public or private) of the instance should remain consistent to avoid connectivity issues. A discrepancy in accessibility settings can lead to a situation where an instance switches from being publicly accessible to privately accessible, disrupting access to the database cluster.
Consistency in accessibility settings helps maintain a secure network environment and ensures compliance with organizational policies and regulatory requirements. Publicly accessible instances expose databases to the internet, which might be necessary for some applications but could pose security risks if not managed properly.
... see more
Remediationβ
Remediationβ
Identify the Violating AWS RDS Aurora Clustersβ
From Consoleβ
Log in to the AWS management console and navigate to the RDS dashboard at AWS RDS Console.
In the left navigation panel, choose
Databases
.Select the Aurora database cluster that you want to examine. Check the database engine type in the
Engine
column (e.g., Aurora MySQL or Aurora PostgreSQL).Click on the name of the writer/reader database instance within the selected Aurora cluster.
Select the
Connectivity & Security
tab and check thePublic Accessibility
attribute value to determine if the writer instance is publicly accessible:
Yes
: The database instance is publicly accessible.No
: The instance is not publicly accessible.If the verified cluster database instances have different values for the
Public Accessibility
attribute, the instances within the selected Amazon Aurora database cluster do not have the same accessibility. In case of failover, the connectivity to the cluster will be lost.... see more
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ Cloudaware Framework β πΌ Secure Access | 43 | |||
πΌ Cloudaware Framework β πΌ System Configuration | 24 |