🛡️ AWS RDS Instance automated backups are not enabled🟢
- Contextual name: 🛡️ Instance automated backups are not enabled🟢
- ID:
/ce/ca/aws/rds/instance-automated-backups - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- AWS Security Hub: [RDS.11] RDS instances should have automatic backups enabled
Description
Description
Ensure that Amazon Relational Database Service (RDS) instances have automated backups enabled.
Automated backups allow you to recover your database to any point in time within your specified retention period (up to 35 days). When automated backups are enabled, RDS automatically performs a full daily snapshot of your data (during your preferred backup window) and captures transaction logs (as updates to your DB instance are made).
Rationale
Disabling automated backups eliminates the ability to perform point-in-time recovery. In the event of data corruption, accidental deletion, or hardware failure, you may lose critical data if recent backups are not available.
Audit
This policy flags an AWS RDS Instance as
INCOMPLIANTif theBackup Retention Periodis set to 0.
Remediation
Remediation
Enable Automated Backups
From Command Line
To enable automated backups for an RDS instance, use the
modify-db-instancecommand. Specify the desired retention period in days (up to 35) and apply the change immediately if appropriate:aws rds modify-db-instance \
--db-instance-identifier {{db-instance}} \
--backup-retention-period 3 \
--apply-immediatelyFor Multi-AZ DB clusters, use the
modify-db-clustercommand instead:aws rds modify-db-cluster \
--db-cluster-identifier {{db-cluster}} \
--backup-retention-period 3 \
--apply-immediatelyYou can include either the
--apply-immediatelyflag to apply changes right away, or--no-apply-immediatelyto defer the update until the next maintenance window.