Skip to main content

💼 3.2.3 Ensure that RDS instances are not publicly accessible (Automated)

  • ID: /frameworks/cis-aws-v7.0.0/03/02/03

Description

Ensure and verify that the RDS database instances provisioned in your AWS account restrict unauthorized access in order to minimize security risks. To restrict access to any RDS database instance, you must disable the Publicly Accessible flag for the database and update the VPC security group associated with the instance.

Similar

  • Sections
    • /frameworks/cis-aws-v6.0.0/03/02/03

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v6.0.0 → 💼 3.2.3 Ensure that RDS instances are not publicly accessible (Automated)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v6.0.0 → 💼 3.2.3 Ensure that RDS instances are not publicly accessible (Automated)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS RDS Instance is publicly accessible🟢1🟢 x6no data