Skip to main content

๐Ÿ›ก๏ธ AWS RDS Instance automated backups are not enabled๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Instance automated backups are not enabled๐ŸŸข
  • ID: /ce/ca/aws/rds/instance-automated-backups
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Similar Policiesโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

Ensure that Amazon Relational Database Service (RDS) instances have automated backups enabled.

Automated backups allow you to recover your database to any point in time within your specified retention period (up to 35 days). When automated backups are enabled, RDS automatically performs a full daily snapshot of your data (during your preferred backup window) and captures transaction logs (as updates to your DB instance are made).

Rationaleโ€‹

Disabling automated backups eliminates the ability to perform point-in-time recovery. In the event of data corruption, accidental deletion, or hardware failure, you may lose critical data if recent backups are not available.

Auditโ€‹

This policy flags an AWS RDS Instance as INCOMPLIANT if the Backup Retention Period is set to 0.

Remediationโ€‹

Open File

Remediationโ€‹

Enable Automated Backupsโ€‹

From Command Lineโ€‹

To enable automated backups for an RDS instance, use the modify-db-instance command. Specify the desired retention period in days (up to 35) and apply the change immediately if appropriate:

aws rds modify-db-instance \
--db-instance-identifier {{db-instance}} \
--backup-retention-period 3 \
--apply-immediately

For Multi-AZ DB clusters, use the modify-db-cluster command instead:

aws rds modify-db-cluster \
--db-cluster-identifier {{db-cluster}} \
--backup-retention-period 3 \
--apply-immediately

You can include either the --apply-immediately flag to apply changes right away, or --no-apply-immediately to defer the update until the next maintenance window.

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ AWS Foundational Security Best Practices v1.0.0 โ†’ ๐Ÿ’ผ [RDS.11] RDS instances should have automatic backups enabled1no data
๐Ÿ’ผ AWS Well-Architected โ†’ ๐Ÿ’ผ REL09-BP01 Identify and back up all data that needs to be backed up, or reproduce the data from sources2no data
๐Ÿ’ผ AWS Well-Architected โ†’ ๐Ÿ’ผ REL09-BP03 Perform data backup automatically3no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Data Protection and Recovery18no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CP-6 Alternate Storage Site (M)(H)315no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CP-6(1) Separation from Primary Site (M)(H)3no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CP-6(2) Recovery Time and Recovery Point Objectives (H)15no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CP-9 System Backup (L)(M)(H)5411no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CP-10 System Recovery and Reconstitution (L)(M)(H)216no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ SI-12 Information Management and Retention (L)(M)(H)6no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ CP-9 System Backup (L)(M)(H)9no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ CP-10 System Recovery and Reconstitution (L)(M)(H)16no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ SI-12 Information Management and Retention (L)(M)(H)6no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ CP-6 Alternate Storage Site (M)(H)23no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ CP-6(1) Separation from Primary Site (M)(H)3no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ CP-9 System Backup (L)(M)(H)211no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ CP-10 System Recovery and Reconstitution (L)(M)(H)116no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ SI-12 Information Management and Retention (L)(M)(H)6no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.AM-07: Inventories of data and corresponding metadata for designated data types are maintained6no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.AM-08: Systems, hardware, software, services, and data are managed throughout their life cycles26no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected180no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected176no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.DS-11: Backups of data are created, protected, maintained, and tested12no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.IR-04: Adequate resource capacity to ensure availability is maintained3no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ RC.RP-01: The recovery portion of the incident response plan is executed once initiated from the incident response process16no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ RC.RP-02: Recovery actions are selected, scoped, prioritized, and performed16no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ RC.RP-03: The integrity of backups and other restoration assets is verified before using them for restoration6no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ RC.RP-05: The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed16no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CP-6 Alternate Storage Site315no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CP-6(1) Alternate Storage Site _ Separation from Primary Site3no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CP-6(2) Alternate Storage Site _ Recovery Time and Recovery Point Objectives15no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CP-9 System Backup88no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CP-10 System Recovery and Reconstitution616no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SC-5(2) Denial-of-service Protection _ Capacity, Bandwidth, and Redundancy16no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-12 Information Management and Retention36no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-13(5) Predictable Failure Prevention _ Failover Capability14no data