๐ก๏ธ AWS RDS Instance automated backups are not enabled๐ข
- Contextual name: ๐ก๏ธ Instance automated backups are not enabled๐ข
- ID:
/ce/ca/aws/rds/instance-automated-backups - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Similar Policiesโ
- AWS Security Hub: [RDS.11] RDS instances should have automatic backups enabled
Descriptionโ
Descriptionโ
Ensure that Amazon Relational Database Service (RDS) instances have automated backups enabled.
Automated backups allow you to recover your database to any point in time within your specified retention period (up to 35 days). When automated backups are enabled, RDS automatically performs a full daily snapshot of your data (during your preferred backup window) and captures transaction logs (as updates to your DB instance are made).
Rationaleโ
Disabling automated backups eliminates the ability to perform point-in-time recovery. In the event of data corruption, accidental deletion, or hardware failure, you may lose critical data if recent backups are not available.
Auditโ
This policy flags an AWS RDS Instance as
INCOMPLIANTif theBackup Retention Periodis set to 0.
Remediationโ
Remediationโ
Enable Automated Backupsโ
From Command Lineโ
To enable automated backups for an RDS instance, use the
modify-db-instancecommand. Specify the desired retention period in days (up to 35) and apply the change immediately if appropriate:aws rds modify-db-instance \
--db-instance-identifier {{db-instance}} \
--backup-retention-period 3 \
--apply-immediatelyFor Multi-AZ DB clusters, use the
modify-db-clustercommand instead:aws rds modify-db-cluster \
--db-cluster-identifier {{db-cluster}} \
--backup-retention-period 3 \
--apply-immediatelyYou can include either the
--apply-immediatelyflag to apply changes right away, or--no-apply-immediatelyto defer the update until the next maintenance window.