π‘οΈ AWS RDS Instance automated backups are not enabledπ’
- Contextual name: π‘οΈ Instance automated backups are not enabledπ’
- ID:
/ce/ca/aws/rds/instance-automated-backups - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [RDS.11] RDS instances should have automatic backups enabled
Descriptionβ
Descriptionβ
Ensure that Amazon Relational Database Service (RDS) instances have automated backups enabled.
Automated backups allow you to recover your database to any point in time within your specified retention period (up to 35 days). When automated backups are enabled, RDS automatically performs a full daily snapshot of your data (during your preferred backup window) and captures transaction logs (as updates to your DB instance are made).
Rationaleβ
Disabling automated backups eliminates the ability to perform point-in-time recovery. In the event of data corruption, accidental deletion, or hardware failure, you may lose critical data if recent backups are not available.
Auditβ
This policy flags an AWS RDS Instance as
INCOMPLIANTif theBackup Retention Periodis set to 0.
Remediationβ
Remediationβ
Enable Automated Backupsβ
From Command Lineβ
To enable automated backups for an RDS instance, use the
modify-db-instancecommand. Specify the desired retention period in days (up to 35) and apply the change immediately if appropriate:aws rds modify-db-instance \
--db-instance-identifier {{db-instance}} \
--backup-retention-period 3 \
--apply-immediatelyFor Multi-AZ DB clusters, use the
modify-db-clustercommand instead:aws rds modify-db-cluster \
--db-cluster-identifier {{db-cluster}} \
--backup-retention-period 3 \
--apply-immediatelyYou can include either the
--apply-immediatelyflag to apply changes right away, or--no-apply-immediatelyto defer the update until the next maintenance window.