🛡️ AWS RDS Instance Enhanced Monitoring is not enabled🟢
- Contextual name: 🛡️ Instance Enhanced Monitoring is not enabled🟢
- ID:
/ce/ca/aws/rds/instance-enhanced-monitoring - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
PERFORMANCE
Logic
Similar Policies
- AWS Security Hub: [RDS.6] Enhanced monitoring should be configured for RDS DB instances
Description
Description
This policy identifies AWS RDS Instances for which Enhanced Monitoring is not enabled.
Amazon RDS provides real-time OS metrics for the DB instances it runs. These metrics allow you to view system-level performance data and process information directly in the AWS Management Console. You can control which metrics are collected for each instance and customize monitoring dashboards based on your operational requirements.
Rationale
Enhanced Monitoring offers deeper visibility into database instance health by collecting metrics from an agent running on the instance, rather than relying solely on hypervisor-level data. It delivers OS-level metrics, such as CPU utilization, memory usage, file system activity, and disk I/O, at granular intervals as low as one second.
In contrast, standard Amazon CloudWatch metrics are aggregated at 60-second intervals. Enhanced Monitoring enables detection of short-lived performance spikes or resource-intensive processes that may be obscured by one-minute averages.
Audit
... see more
Remediation
Remediation
Enable Enhanced Monitoring
Enhanced Monitoring requires an IAM role that allows Amazon RDS to publish OS-level metrics to Amazon CloudWatch Logs. If you already have a dedicated role, you can proceed to the Enable Enhanced Monitoring on the DB Instance step.
From Command Line
1. Create the IAM Role for Enhanced Monitoring
Create a trust policy that allows Amazon RDS to assume the role:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "monitoring.rds.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}Create the IAM role:
aws iam create-role \
--role-name {{rds-monitoring-role}} \
--assume-role-policy-document file://{{monitoring-trust-policy}}.jsonAttach the AWS-managed policy required for Enhanced Monitoring:
aws iam attach-role-policy \
--role-name {{rds-monitoring-role}} \
--policy-arn arn:aws:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole
... [see more](remediation.md)