Skip to main content

๐Ÿ›ก๏ธ AWS RDS Multi-AZ Cluster Auto Minor Version Upgrade is not enabled๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Multi-AZ Cluster Auto Minor Version Upgrade is not enabled๐ŸŸข
  • ID: /ce/ca/aws/rds/cluster-auto-minor-version-upgrade
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY, RELIABILITY, PERFORMANCE

Logicโ€‹

Similar Policiesโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

This policy identifies AWS RDS Multi-AZ Clusters where the Auto Minor Version Upgrade feature is disabled.

Rationaleโ€‹

Enabling automatic minor version upgrades ensures that clusters receive the latest engine updates, which may include critical security patches, bug fixes, and performance improvements. For Multi-AZ clusters designed to provide high availability, maintaining consistent updates across all instances is essential for stability, security, and uniform behavior, particularly during failover events.

Auditโ€‹

This policy flags a Multi-AZ AWS RDS Cluster as INCOMPLIANT if the Auto Minor Version Upgrade field is set to No.

A Cluster is marked as INAPPLICABLE if the Multi-AZ field is set to false.

Remediationโ€‹

Open File

Remediationโ€‹

Enable Automatic Minor Version Upgradesโ€‹

Using AWS CloudFormationโ€‹
  • CloudFormation template (YAML):
AWSTemplateFormatVersion: '2010-09-09'
Description: Enables automatic minor version upgrades for an existing RDS cluster.

Parameters:
DBClusterId:
Type: String
Description: ID of the existing RDS cluster

Resources:
AutoMinorUpgradeRDS:
Type: AWS::RDS::DBCluster
Properties:
DBClusterIdentifier: !Ref DBClusterId
AutoMinorVersionUpgrade: true
From Command Lineโ€‹
aws rds modify-db-cluster
--db-cluster-identifier {{cluster-id}}
--auto-minor-version-upgrade
[--apply-immediately]

To apply the change during the next maintenance window, omit the --apply-immediately flag.

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ AWS Foundational Security Best Practices v1.0.0 โ†’ ๐Ÿ’ผ [RDS.35] RDS DB clusters should have automatic minor version upgrade enabled1no data
๐Ÿ’ผ AWS Well-Architected โ†’ ๐Ÿ’ผ OPS05-BP05 Perform patch management4no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Infrastructure Modernization17no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ SI-2 Flaw Remediation (L)(M)(H)2714no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ SI-2(2) Automated Flaw Remediation Status (M)(H)4no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ SI-2 Flaw Remediation (L)(M)(H)14no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ SI-2 Flaw Remediation (L)(M)(H)214no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ SI-2(2) Automated Flaw Remediation Status (M)(H)4no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.IM-01: Improvements are identified from evaluations26no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties40no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities41no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-2 Flaw Remediation6611no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-2(2) Flaw Remediation _ Automated Flaw Remediation Status14no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-2(4) Flaw Remediation _ Automated Patch Management Tools4no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-2(5) Flaw Remediation _ Automatic Software and Firmware Updates24no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches.4no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates4no data
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates4no data