🛡️ AWS RDS Instance IAM Database Authentication is not enabled🟢
- Contextual name: 🛡️ Instance IAM Database Authentication is not enabled🟢
- ID:
/ce/ca/aws/rds/instance-iam-authentication - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- AWS Security Hub: [RDS.10] IAM authentication should be configured for RDS instances
Description
Description
This policy identifies AWS RDS Instances that are not configured to use IAM Database Authentication. IAM database authentication enables password-free access to database instances by using short-lived authentication tokens generated by AWS IAM.
Rationale
IAM database authentication provides enhanced security and centralized access management compared to traditional password-based authentication. Instead of relying on shared or long-lived database passwords, users and applications authenticate using short-lived (15-minute) tokens generated by AWS IAM, significantly reducing the risk of credential compromise. Database access can be managed through IAM users and roles, enabling organizations to apply consistent identity governance and access control practices across AWS services. In addition, authentication activity can be audited using AWS CloudTrail, improving visibility into database access. All connections established using IAM authentication are required to use SSL/TLS encryption.
Audit
This policy flags an AWS RDS Instance as
INCOMPLIANTif IAM Database Authentication Enabled is set to false.... see more
Remediation
Remediation
Enable IAM Database Authentication
To enable IAM Database Authentication for an existing AWS RDS instance, update the instance configuration to allow authentication using IAM-generated tokens.
From Command Line
Run the following command to enable IAM database authentication for the specified DB instance:
aws rds modify-db-instance \
--db-instance-identifier {{instance-id}} \
--enable-iam-database-authentication \
--apply-immediatelyBy default, configuration changes are applied during the next scheduled maintenance window. Using the
--apply-immediatelyparameter forces the change to take effect as soon as possible and may result in a brief service interruption.