Skip to main content

๐Ÿ›ก๏ธ AWS RDS Instance Multi-AZ Deployment is not enabled๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Instance Multi-AZ Deployment is not enabled๐ŸŸข
  • ID: /ce/ca/aws/rds/instance-multi-az-deployment
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: RELIABILITY

Logicโ€‹

Similar Policiesโ€‹

Similar Internal Rulesโ€‹

RulePoliciesFlags
โœ‰๏ธ dec-x-5b3728e81

Descriptionโ€‹

Open File

Descriptionโ€‹

Amazon RDS offers Multi-AZ deployments that provide enhanced availability and durability for your databases, using synchronous replication to replicate data to a standby instance in a different Availability Zone (AZ). In the event of an infrastructure failure, Amazon RDS automatically fails over to the standby to minimize downtime and ensure business continuity.

Rationaleโ€‹

Database availability is crucial for maintaining service uptime, particularly for applications that are critical to the business. Implementing Multi-AZ deployments with Amazon RDS ensures that your databases are protected against unplanned outages due to hardware failures, network issues, or other disruptions. This configuration enhances both the availability and durability of your database, making it a highly recommended practice for production environments.

Impactโ€‹

Multi-AZ deployments may increase costs due to the additional resources required to maintain a standby instance; however, the benefits of increased availability and reduced risk of downtime outweigh these costs for critical applications.

... see more

Remediationโ€‹

Open File

Remediationโ€‹

Using AWS CloudFormationโ€‹

  • CloudFormation template (YAML):
AWSTemplateFormatVersion: '2010-09-09'
Description: Enables Multi-AZ deployment for an existing RDS instance.

Parameters:
DBInstanceIdentifier:
Type: String
Description: The ID of the existing RDS instance

Resources:
MultiAZRDSInstance:
Type: AWS::RDS::DBInstance
Properties:
DBInstanceIdentifier: !Ref DBInstanceIdentifier
MultiAZ: true

From Consoleโ€‹

  1. Login to the AWS Management Console and open the RDS dashboard.
  2. In the left navigation pane, click on Databases.
  3. Select the database instance that needs Multi-AZ deployment to be enabled.
  4. Click the Modify button at the top right.
  5. Scroll down to the Availability & Durability section.
  6. Under Multi-AZ deployment, select Yes to enable.
  7. Review the changes and click Continue.
  8. On the Review page, choose Apply immediately to make the change without waiting for the next maintenance window, or Apply during the next scheduled maintenance window.

... see more

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ APRA CPG 234 โ†’ ๐Ÿ’ผ 73f response and recovery which involves a mixture of system restoration (where integrity and availability have been compromised) and managing sensitive data loss where confidentiality has been compromised. This allows for a return to businessas-usual processing;44no data
๐Ÿ’ผ AWS Foundational Security Best Practices v1.0.0 โ†’ ๐Ÿ’ผ [RDS.5] RDS DB instances should be configured with multiple Availability Zones11no data
๐Ÿ’ผ CIS AWS v4.0.0 โ†’ ๐Ÿ’ผ 2.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
๐Ÿ’ผ CIS AWS v4.0.1 โ†’ ๐Ÿ’ผ 2.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
๐Ÿ’ผ CIS AWS v5.0.0 โ†’ ๐Ÿ’ผ 2.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
๐Ÿ’ผ CIS AWS v6.0.0 โ†’ ๐Ÿ’ผ 3.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDS (Manual)1no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ System Configuration45no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CP-6(2) Recovery Time and Recovery Point Objectives (H)12no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ CP-10 System Recovery and Reconstitution (L)(M)(H)212no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ CP-10 System Recovery and Reconstitution (L)(M)(H)12no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ CP-10 System Recovery and Reconstitution (L)(M)(H)112no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ PR.IR-03: Mechanisms are implemented to achieve resilience requirements in normal and adverse situations15no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ RC.RP-01: The recovery portion of the incident response plan is executed once initiated from the incident response process12no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ RC.RP-02: Recovery actions are selected, scoped, prioritized, and performed12no data
๐Ÿ’ผ NIST CSF v2.0 โ†’ ๐Ÿ’ผ RC.RP-05: The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed12no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CP-6(2) Alternate Storage Site _ Recovery Time and Recovery Point Objectives12no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ CP-10 System Recovery and Reconstitution612no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SC-5(2) Denial-of-service Protection _ Capacity, Bandwidth, and Redundancy11no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SC-36 Distributed Processing and Storage26no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ SI-13(5) Predictable Failure Prevention _ Failover Capability11no data