Skip to main content

💼 2.2.3 Ensure that RDS instances are not publicly accessible (Automated)

  • ID: /frameworks/cis-aws-v4.0.0/02/02/03

Description

Ensure and verify that the RDS database instances provisioned in your AWS account restrict unauthorized access in order to minimize security risks. To restrict access to any RDS database instance, you must disable the Publicly Accessible flag for the database and update the VPC security group associated with the instance.

Similar

  • Sections
    • /frameworks/cis-aws-v4.0.1/02/02/03
    • /frameworks/cis-aws-v3.0.0/02/03/03

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v3.0.0 → 💼 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated)11no data
💼 CIS AWS v4.0.1 → 💼 2.2.3 Ensure that RDS instances are not publicly accessible (Automated)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v3.0.0 → 💼 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated)11no data
💼 CIS AWS v4.0.1 → 💼 2.2.3 Ensure that RDS instances are not publicly accessible (Automated)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS RDS Instance is publicly accessible🟢1🟢 x6no data