Skip to main content

πŸ›‘οΈ AWS RDS Instance Multi-AZ Deployment is not enabled🟒

  • Contextual name: πŸ›‘οΈ Instance Multi-AZ Deployment is not enabled🟒
  • ID: /ce/ca/aws/rds/instance-multi-az-deployment
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: RELIABILITY

Logic​

Similar Policies​

Similar Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-5b3728e81

Description​

Open File

Description​

Amazon RDS offers Multi-AZ deployments that provide enhanced availability and durability for your databases, using synchronous replication to replicate data to a standby instance in a different Availability Zone (AZ). In the event of an infrastructure failure, Amazon RDS automatically fails over to the standby to minimize downtime and ensure business continuity.

Rationale​

Database availability is crucial for maintaining service uptime, particularly for applications that are critical to the business. Implementing Multi-AZ deployments with Amazon RDS ensures that your databases are protected against unplanned outages due to hardware failures, network issues, or other disruptions. This configuration enhances both the availability and durability of your database, making it a highly recommended practice for production environments.

Impact​

Multi-AZ deployments may increase costs due to the additional resources required to maintain a standby instance; however, the benefits of increased availability and reduced risk of downtime outweigh these costs for critical applications.

... see more

Remediation​

Open File

Remediation​

Using AWS CloudFormation​

  • CloudFormation template (YAML):
AWSTemplateFormatVersion: '2010-09-09'
Description: Enables Multi-AZ deployment for an existing RDS instance.

Parameters:
DBInstanceIdentifier:
Type: String
Description: The ID of the existing RDS instance

Resources:
MultiAZRDSInstance:
Type: AWS::RDS::DBInstance
Properties:
DBInstanceIdentifier: !Ref DBInstanceIdentifier
MultiAZ: true

From Console​

  1. Login to the AWS Management Console and open the RDS dashboard.
  2. In the left navigation pane, click on Databases.
  3. Select the database instance that needs Multi-AZ deployment to be enabled.
  4. Click the Modify button at the top right.
  5. Scroll down to the Availability & Durability section.
  6. Under Multi-AZ deployment, select Yes to enable.
  7. Review the changes and click Continue.
  8. On the Review page, choose Apply immediately to make the change without waiting for the next maintenance window, or Apply during the next scheduled maintenance window.

... see more

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό APRA CPG 234 β†’ πŸ’Ό 73f response and recovery which involves a mixture of system restoration (where integrity and availability have been compromised) and managing sensitive data loss where confidentiality has been compromised. This allows for a return to businessas-usual processing;44no data
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.5] RDS DB instances should be configured with multiple Availability Zones11no data
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 2.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
πŸ’Ό CIS AWS v4.0.1 β†’ πŸ’Ό 2.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
πŸ’Ό CIS AWS v5.0.0 β†’ πŸ’Ό 2.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
πŸ’Ό CIS AWS v6.0.0 β†’ πŸ’Ό 3.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό System Configuration45no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CP-6(2) Recovery Time and Recovery Point Objectives (H)12no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CP-10 System Recovery and Reconstitution (L)(M)(H)212no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό CP-10 System Recovery and Reconstitution (L)(M)(H)12no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό CP-10 System Recovery and Reconstitution (L)(M)(H)112no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.IR-03: Mechanisms are implemented to achieve resilience requirements in normal and adverse situations15no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RC.RP-01: The recovery portion of the incident response plan is executed once initiated from the incident response process12no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RC.RP-02: Recovery actions are selected, scoped, prioritized, and performed12no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RC.RP-05: The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed12no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CP-6(2) Alternate Storage Site _ Recovery Time and Recovery Point Objectives12no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CP-10 System Recovery and Reconstitution612no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-5(2) Denial-of-service Protection _ Capacity, Bandwidth, and Redundancy11no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-36 Distributed Processing and Storage26no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-13(5) Predictable Failure Prevention _ Failover Capability11no data