Skip to main content

💼 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated)

  • ID: /frameworks/cis-aws-v3.0.0/02/03/03

Description

Ensure and verify that RDS database instances provisioned in your AWS account do restrict unauthorized access in order to minimize security risks. To restrict access to any publicly accessible RDS database instance, you must disable the database Publicly Accessible flag and update the VPC security group associated with the instance.

Similar

  • Sections
    • /frameworks/cis-aws-v4.0.0/02/02/03
    • /frameworks/cis-aws-v2.0.0/02/03/03
  • Internal
    • ID: dec-c-8932b495

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v2.0.0 → 💼 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated)11no data
💼 CIS AWS v4.0.0 → 💼 2.2.3 Ensure that RDS instances are not publicly accessible (Automated)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v2.0.0 → 💼 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated)11no data
💼 CIS AWS v4.0.0 → 💼 2.2.3 Ensure that RDS instances are not publicly accessible (Automated)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS RDS Instance is publicly accessible🟢1🟢 x6no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-f937c35f1