π‘οΈ AWS Redshift Cluster is publicly accessibleπ’
- Contextual name: π‘οΈ Cluster is publicly accessibleπ’
- ID:
/ce/ca/aws/redshift/cluster-publicly-accessible - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [Redshift.1] Amazon Redshift clusters should prohibit public access
Descriptionβ
Descriptionβ
This policy identifies AWS Redshift Clusters are configured with the Publicly Accessible setting enabled. When this flag is set to
true, the cluster is internet-facing and assigned a publicly resolvable DNS name that maps to a public IP address.Rationaleβ
Publicly accessible databases and data warehouses significantly increase the attack surface of your cloud environment. Exposing a Redshift cluster to the Internet allows unauthorized actors to attempt exploitation of vulnerabilities or perform brute-force attacks against the cluster endpoint. Configuring clusters as private supports a defense-in-depth strategy by ensuring that access to the data warehouse is restricted to trusted networks within your VPC.
Auditβ
This policy flags an AWS Redshift Cluster as
INCOMPLIANTifPublicly Accessibleis set to Yes.Clusters that are not in the available state are marked as
INAPPLICABLE.
Remediationβ
Remediationβ
Disable Public Accessibilityβ
To reduce the attack surface and prevent Internet exposure, configure Amazon Redshift clusters to be private by disabling public accessibility. This ensures the cluster endpoint is reachable only from within trusted networks in your VPC.
From Command Lineβ
Use the following AWS CLI command to disable public access for the specified Redshift cluster:
aws redshift modify-cluster \
--cluster-identifier {{cluster-id}} \
--no-publicly-accessibleNote: This change may require a cluster restart to take effect, depending on the current configuration.
After applying the change, verify that applications and users can still connect to the cluster through approved private network paths.
Additional Considerationsβ
- Private Connectivity: Use Interface VPC Endpoints (AWS PrivateLink) to enable secure, private connectivity to Amazon Redshift without routing traffic over the public Internet.
- Network Restrictions: Apply the principle of least privilege by configuring security groups to allow inbound traffic only on the Redshift port (default: 5439) and only from approved internal IP ranges or VPC resources.