Skip to main content

💼 [RDS.46] RDS DB instances should not be deployed in public subnets with routes to internet gateways

  • ID: /frameworks/aws-fsbp-v1.0.0/rds/46

Description​

By provisioning your Amazon RDS resources in private subnets, you can prevent your RDS resources from receiving inbound traffic from the public internet, which can prevent unintended access to your RDS DB instances. If RDS resources are provisioned in a public subnet that is open to the internet, they might be vulnerable to risks such as data exfiltration.

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance