Skip to main content

πŸ›‘οΈ AWS RDS Multi-AZ Cluster Auto Minor Version Upgrade is not enabled🟒

  • Contextual name: πŸ›‘οΈ Multi-AZ Cluster Auto Minor Version Upgrade is not enabled🟒
  • ID: /ce/ca/aws/rds/cluster-auto-minor-version-upgrade
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY, RELIABILITY, PERFORMANCE

Logic​

Similar Policies​

Description​

Open File

Description​

This policy identifies AWS RDS Multi-AZ Clusters where the Auto Minor Version Upgrade feature is disabled.

Rationale​

Enabling automatic minor version upgrades ensures that clusters receive the latest engine updates, which may include critical security patches, bug fixes, and performance improvements. For Multi-AZ clusters designed to provide high availability, maintaining consistent updates across all instances is essential for stability, security, and uniform behavior, particularly during failover events.

Audit​

This policy flags a Multi-AZ AWS RDS Cluster as INCOMPLIANT if the Auto Minor Version Upgrade field is set to No.

A Cluster is marked as INAPPLICABLE if the Multi-AZ field is set to false.

Remediation​

Open File

Remediation​

Enable Automatic Minor Version Upgrades​

Using AWS CloudFormation​
  • CloudFormation template (YAML):
AWSTemplateFormatVersion: '2010-09-09'
Description: Enables automatic minor version upgrades for an existing RDS cluster.

Parameters:
DBClusterId:
Type: String
Description: ID of the existing RDS cluster

Resources:
AutoMinorUpgradeRDS:
Type: AWS::RDS::DBCluster
Properties:
DBClusterIdentifier: !Ref DBClusterId
AutoMinorVersionUpgrade: true
From Command Line​
aws rds modify-db-cluster
--db-cluster-identifier {{cluster-id}}
--auto-minor-version-upgrade
[--apply-immediately]

To apply the change during the next maintenance window, omit the --apply-immediately flag.

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.35] RDS DB clusters should have automatic minor version upgrade enabled1no data
πŸ’Ό AWS Well-Architected β†’ πŸ’Ό OPS05-BP05 Perform patch management4no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό Infrastructure Modernization15no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-2 Flaw Remediation (L)(M)(H)2713no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-2(2) Automated Flaw Remediation Status (M)(H)4no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό SI-2 Flaw Remediation (L)(M)(H)13no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-2 Flaw Remediation (L)(M)(H)213no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-2(2) Automated Flaw Remediation Status (M)(H)4no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-01: Improvements are identified from evaluations25no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties38no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities39no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-2 Flaw Remediation6610no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-2(2) Flaw Remediation _ Automated Flaw Remediation Status14no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-2(4) Flaw Remediation _ Automated Patch Management Tools4no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-2(5) Flaw Remediation _ Automatic Software and Firmware Updates24no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches.4no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates4no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates4no data