π AWS RDS Snapshot is publicly accessible π’
- Contextual name: π Snapshot is publicly accessible π’
- ID:
/ce/ca/aws/rds/snapshot-publicly-accessible
- Located in: π AWS RDS
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-b3342905
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-b3342905 | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Ensure that your AWS Relational Database Service (RDS) database snapshots are not publicly accessible (i.e., shared with all AWS accounts and users) to protect your private data.
Rationaleβ
RDS snapshots contain both the data and configurations of your database instances. If these snapshots are publicly accessible, unauthorized users can access sensitive information, leading to data breaches and other security issues. Keeping RDS snapshots private helps maintain the confidentiality and integrity of your data.
Publicly sharing an AWS RDS database snapshot grants another AWS account permission to copy the snapshot and create database instances from it. It is strongly recommended not to share your database snapshots with all AWS accounts. If necessary, you can share your RDS snapshots with specific AWS accounts without making them public.
Auditβ
This policy marks an AWS RDS snapshot as
INCOMPLIANT
if the snapshot type ispublic
or if the snapshot'srestore
attribute is set toall
.An AWS RDS snapshot is marked as
INAPPLICABLE
when:... see more
Remediationβ
Remediationβ
Case A: Make a snapshot private (accessible only by a current AWS Account)β
From Console