Skip to main content

๐Ÿ›ก๏ธ AWS RDS Instance Event Subscription for critical events is not configured๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Instance Event Subscription for critical events is not configured๐ŸŸข
  • ID: /ce/ca/aws/rds/instance-event-subscription
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: RELIABILITY

Logicโ€‹

Similar Policiesโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

This policy evaluates whether there is an AWS RDS Event Subscription that is configured to send notifications for the following source type and event categories:

  • Source type: db-instance
  • Event categories: maintenance, configuration change, failure

Amazon RDS event notifications use Amazon SNS to notify you of changes to the availability or configuration of RDS database instances, enabling timely operational response.

Rationaleโ€‹

Event monitoring is a critical component of maintaining the availability, reliability, and performance of Amazon RDS database instances. Subscribing to maintenance, configuration change, and failure events ensures that operational teams are promptly informed of changes that may impact database stability or service continuity.

Auditโ€‹

This policy flags an AWS Account as INCOMPLIANT if no Amazon RDS Event Subscriptions are configured to notify on maintenance, configuration change, and failure events for the db-instance source type.

Referencesโ€‹

  1. https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Monitoring.html

... see more

Remediationโ€‹

Open File

Remediationโ€‹

Create an RDS Event Subscriptionโ€‹

Configure Amazon RDS event subscriptions to receive notifications for maintenance, configuration change, and failure events for DB instances.

From Consoleโ€‹
  1. Sign in to the AWS Management Console.

  2. Navigate to the Amazon RDS console.

  3. In the navigation pane, under Amazon RDS, select Event subscriptions.

  4. Choose Create event subscription.

  5. On the Create event subscription page, configure the following settings:

    • Enter a unique name in the Name field.

    Target Section

    • For Send notifications to, choose one of the following:

      • Create a new Amazon SNS topic. Provide a unique Topic name and specify the email address(es) to receive notifications.
      • Select an existing Amazon SNS topic by choosing its ARN from the list.

    Source Section

    • Set Source type to Database Instance.
    • For Database Instances to include, select All database instances.
    • For Event categories to include, select Select specific event categories and choose maintenance, configuration change, and failure.

... see more

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ AWS Foundational Security Best Practices v1.0.0 โ†’ ๐Ÿ’ผ [RDS.20] Existing RDS event notification subscriptions should be configured for critical database instance events1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ System Configuration54no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CA-7 Continuous Monitoring (L)(M)(H)222no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ SI-2 Flaw Remediation (L)(M)(H)2719no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ CA-7 Continuous Monitoring (L)(M)(H)122no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ SI-2 Flaw Remediation (L)(M)(H)19no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ CA-7 Continuous Monitoring (L)(M)(H)222no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ SI-2 Flaw Remediation (L)(M)(H)219no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ DE.AE-02: Potentially adverse events are analyzed to better understand associated activities44no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ DE.AE-03: Information is correlated from multiple sources59no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ DE.CM-01: Networks and network services are monitored to find potentially adverse events161no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ DE.CM-02: The physical environment is monitored to find potentially adverse events22no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events94no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ DE.CM-06: External service provider activities and services are monitored to find potentially adverse events44no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events162no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.IM-01: Improvements are identified from evaluations36no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties50no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities51no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded40no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ ID.RA-07: Changes and exceptions are managed, assessed for risk impact, recorded, and tracked39no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CA-7 Continuous Monitoring622no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-2 Flaw Remediation6616no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 11.5 Deploy a change-detection mechanism to alert personnel to unauthorized modification of critical system files, configuration files, or content files.15no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 11.5.2 A change-detection mechanism (for example, file integrity monitoring tools) is deployed.4no data
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 11.5.2 A change-detection mechanism (for example, file integrity monitoring tools) is deployed.4no data