docs.aws.amazon.com
Open in
urlscan Pro
18.66.147.42
Public Scan
Submitted URL: https://docs.aws.amazon.com/console/securityhub/RDS.4/remediation
Effective URL: https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html
Submission: On September 11 via api from IN — Scanned from DE
Effective URL: https://docs.aws.amazon.com/securityhub/latest/userguide/rds-controls.html
Submission: On September 11 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
SELECT YOUR COOKIE PREFERENCES We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can click “Customize cookies” to decline performance cookies. If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To continue without accepting these cookies, click “Continue without accepting.” To make more detailed choices or learn more, click “Customize cookies.” Accept all cookiesContinue without acceptingCustomize cookies CUSTOMIZE COOKIE PREFERENCES We use cookies and similar tools (collectively, "cookies") for the following purposes. ESSENTIAL Essential cookies are necessary to provide our site and services and cannot be deactivated. They are usually set in response to your actions on the site, such as setting your privacy preferences, signing in, or filling in forms. PERFORMANCE Performance cookies provide anonymous statistics about how customers navigate our site so we can improve site experience and performance. Approved third parties may perform analytics on our behalf, but they cannot use the data for their own purposes. Allow performance category Allowed FUNCTIONAL Functional cookies help us provide useful site features, remember your preferences, and display relevant content. Approved third parties may set these cookies to provide certain site features. If you do not allow these cookies, then some or all of these services may not function properly. Allow functional category Allowed ADVERTISING Advertising cookies may be set through our site by us or our advertising partners and help us deliver relevant marketing content. If you do not allow these cookies, you will experience less relevant advertising. Allow advertising category Allowed Blocking some types of cookies may impact your experience of our sites. You may review and change your choices at any time by clicking Cookie preferences in the footer of this site. We and selected third-parties use cookies or similar technologies as specified in the AWS Cookie Notice. CancelSave preferences UNABLE TO SAVE COOKIE PREFERENCES We will only store essential cookies at this time, because we were unable to save your cookie preferences. If you want to change your cookie preferences, try again later using the link in the AWS console footer, or contact support if the problem persists. Dismiss Contact Us English Create an AWS Account 1. AWS 2. ... 3. Documentation 4. AWS Security Hub 5. User Guide Feedback Preferences AWS SECURITY HUB USER GUIDE * What is AWS Security Hub? * Terminology and concepts * Prerequisites and recommendations * Using Organizations * Enabling AWS Config * Setting up Security Hub * Enabling Security Hub manually * Managing accounts * Effects of an administrator-member relationship * Restrictions and recommendations * Making the transition to Organizations * Allowed actions for accounts * Designating a Security Hub administrator account * Managing organization member accounts * Enabling new accounts automatically * Enabling member accounts * Disassociating member accounts * Managing member accounts by invitation * Adding and inviting member accounts * Responding to an invitation * Disassociating member accounts * Deleting member accounts * Disassociating from your administrator account * Effect of account actions on Security Hub data * Cross-Region aggregation * How cross-Region aggregation works * Viewing the current configuration * Enabling cross-Region aggregation * Updating the configuration * Stopping cross-Region aggregation * Findings * Creating and updating findings * Using BatchImportFindings * Using BatchUpdateFindings * Viewing a cross-Region finding summary * Viewing finding lists and details * Filtering and grouping findings (console) * Viewing finding details * Taking action on findings * Setting the workflow status of findings * Sending findings to a custom action * Finding format * ASFF syntax * Consolidation and ASFF * ASFF examples * Required attributes * Optional top-level attributes * Resources * Resource attributes * AwsAmazonMQ * AwsApiGateway * AwsAppSync * AwsAthena * AwsAutoScaling * AwsBackup * AwsCertificateManager * AwsCloudFormation * AwsCloudFront * AwsCloudTrail * AwsCloudWatch * AwsCodeBuild * AwsDynamoDB * AwsEc2 * AwsEcr * AwsEcs * AwsEfs * AwsEks * AwsElasticBeanstalk * AwsElasticSearch * AwsElb * AwsEventBridge * AwsGuardDuty * AwsIam * AwsKinesis * AwsKms * AwsLambda * AwsNetworkFirewall * AwsOpenSearchService * AwsRds * AwsRedshift * AwsS3 * AwsSageMaker * AwsSecretsManager * AwsSns * AwsSqs * AwsSsm * AwsStepFunctions * AwsWaf * AwsXray * Container * Other * Insights * Viewing and filtering the list of insights * Viewing insight results and findings * Managed insights * Custom insights * Automations * Automation rules * Automated response and remediation * Types of EventBridge integration * EventBridge event formats * Configuring a rule for automatically sent findings * Configuring and using custom actions * Product integrations * Managing product integrations * AWS service integrations * Third-party product integrations * Using custom product integrations * Standards and controls * IAM permissions for standards and controls * Security checks and scores * AWS Config rules and security checks * Required AWS Config resources for control findings * Schedule for running security checks * Generating and updating control findings * Determining the control status * Determining security scores * Standards reference * AWS FSBP * CIS AWS Foundations Benchmark v1.2.0 and v1.4.0 * NIST SP 800-53 Rev. 5 * PCI DSS * Service-managed standards * Service-Managed Standard: AWS Control Tower * Viewing and managing security standards * Enabling and disabling standards * Viewing details for a standard * Enabling and disabling controls in specific standards * Controls reference * AWS account controls * AWS Certificate Manager controls * API Gateway controls * AWS AppSync controls * Athena controls * CloudFormation controls * CloudFront controls * CloudTrail controls * CloudWatch controls * CodeBuild controls * AWS Config controls * AWS DMS controls * Amazon DocumentDB controls * DynamoDB controls * Amazon ECR controls * Amazon ECS controls * Amazon EC2 controls * Amazon EC2 Auto Scaling controls * Amazon EC2 Systems Manager controls * Amazon EFS controls * Amazon EKS controls * ElastiCache controls * Elastic Beanstalk controls * Elastic Load Balancing controls * Amazon EMR controls * Elasticsearch controls * GuardDuty controls * IAM controls * Kinesis controls * AWS KMS controls * Lambda controls * Neptune controls * Network Firewall controls * OpenSearch Service controls * Amazon RDS controls * Amazon Redshift controls * Amazon S3 controls * SageMaker controls * Secrets Manager controls * Amazon SNS controls * Amazon SQS controls * Step Functions controls * AWS WAF controls * Viewing and managing security controls * Control categories * Enabling and disabling controls in all standards * Enabling new controls in enabled standards automatically * Controls that you might want to disable * Viewing details for a control * Filtering and sorting controls * Viewing and taking action on control findings * Viewing finding and resource details * Sample control findings * Filtering and sorting findings * Taking action on control findings * Creating resources with CloudFormation * Subscribing to Security Hub announcements * Security * Data protection * AWS Identity and Access Management * How AWS Security Hub works with IAM * Using service-linked roles * AWS managed policies * Compliance validation * Infrastructure security * VPC endpoints (AWS PrivateLink) * Logging API calls * Quotas * Regional limits * Disabling Security Hub * Controls change log * Document history Amazon Relational Database Service controls - AWS Security Hub AWSDocumentationAWS Security HubUser Guide [RDS.1] RDS snapshot should be private[RDS.2] RDS DB Instances should prohibit public access, as determined by the PubliclyAccessible AWS Configuration[RDS.3] RDS DB instances should have encryption at-rest enabled[RDS.4] RDS cluster snapshots and database snapshots should be encrypted at rest[RDS.5] RDS DB instances should be configured with multiple Availability Zones[RDS.6] Enhanced monitoring should be configured for RDS DB instances[RDS.7] RDS clusters should have deletion protection enabled[RDS.8] RDS DB instances should have deletion protection enabled[RDS.9] Database logging should be enabled[RDS.10] IAM authentication should be configured for RDS instances[RDS.11] RDS instances should have automatic backups enabled[RDS.12] IAM authentication should be configured for RDS clusters[RDS.13] RDS automatic minor version upgrades should be enabled[RDS.14] Amazon Aurora clusters should have backtracking enabled[RDS.15] RDS DB clusters should be configured for multiple Availability Zones[RDS.16] RDS DB clusters should be configured to copy tags to snapshots[RDS.17] RDS DB instances should be configured to copy tags to snapshots[RDS.18] RDS instances should be deployed in a VPC[RDS.19] An RDS event notifications subscription should be configured for critical cluster events[RDS.20] An RDS event notifications subscription should be configured for critical database instance events[RDS.21] An RDS event notifications subscription should be configured for critical database parameter group events[RDS.22] An RDS event notifications subscription should be configured for critical database security group events[RDS.23] RDS instances should not use a database engine default port[RDS.24] RDS Database clusters should use a custom administrator username[RDS.25] RDS database instances should use a custom administrator username[RDS.26] RDS DB instances should be covered by a backup plan[RDS.27] RDS DB clusters should be encrypted at rest AMAZON RELATIONAL DATABASE SERVICE CONTROLS PDFRSS These controls are related to Amazon RDS resources. These controls may not be available in all AWS Regions. For more information, see Availability of controls by Region. [RDS.1] RDS SNAPSHOT SHOULD BE PRIVATE Related requirements: PCI DSS v3.2.1/1.2.1, PCI DSS v3.2.1/1.3.1, PCI DSS v3.2.1/1.3.4, PCI DSS v3.2.1/1.3.6, PCI DSS v3.2.1/7.2.1, NIST.800-53.r5 AC-21, NIST.800-53.r5 AC-3, NIST.800-53.r5 AC-3(7), NIST.800-53.r5 AC-4, NIST.800-53.r5 AC-4(21), NIST.800-53.r5 AC-6, NIST.800-53.r5 SC-7, NIST.800-53.r5 SC-7(11), NIST.800-53.r5 SC-7(16), NIST.800-53.r5 SC-7(20), NIST.800-53.r5 SC-7(21), NIST.800-53.r5 SC-7(3), NIST.800-53.r5 SC-7(4), NIST.800-53.r5 SC-7(9) Category: Protect > Secure network configuration Severity: Critical Resource type: AWS::RDS::DBClusterSnapshot, AWS::RDS::DBSnapshot AWS Config rule: rds-snapshots-public-prohibited Schedule type: Change triggered Parameters: None This control checks whether Amazon RDS snapshots are public. The control fails if RDS snapshots are public. This control evaluates RDS instances, Aurora DB instances, Neptune DB instances, and Amazon DocumentDB clusters. RDS snapshots are used to back up the data on your RDS instances at a specific point in time. They can be used to restore previous states of RDS instances. An RDS snapshot must not be public unless intended. If you share an unencrypted manual snapshot as public, this makes the snapshot available to all AWS accounts. This may result in unintended data exposure of your RDS instance. Note that if the configuration is changed to allow public access, the AWS Config rule may not be able to detect the change for up to 12 hours. Until the AWS Config rule detects the change, the check passes even though the configuration violates the rule. To learn more about sharing a DB snapshot, see Sharing a DB snapshot in the Amazon RDS User Guide. REMEDIATION To remove public access from RDS snapshots, see Sharing a snapshot in the Amazon RDS User Guide. For DB snapshot visibility, we choose Private. [RDS.2] RDS DB INSTANCES SHOULD PROHIBIT PUBLIC ACCESS, AS DETERMINED BY THE PUBLICLYACCESSIBLE AWS CONFIGURATION Related requirements: PCI DSS v3.2.1/1.2.1, PCI DSS v3.2.1/1.3.1, PCI DSS v3.2.1/1.3.2, PCI DSS v3.2.1/1.3.4, PCI DSS v3.2.1/1.3.6, PCI DSS v3.2.1/7.2.1, NIST.800-53.r5 AC-4, NIST.800-53.r5 AC-4(21), NIST.800-53.r5 SC-7, NIST.800-53.r5 SC-7(11), NIST.800-53.r5 SC-7(16), NIST.800-53.r5 SC-7(21), NIST.800-53.r5 SC-7(4), NIST.800-53.r5 SC-7(5) Category: Protect > Secure network configuration Severity: Critical Resource type: AWS::RDS::DBInstance AWS Config rule: rds-instance-public-access-check Schedule type: Change triggered Parameters: None This control checks whether Amazon RDS instances are publicly accessible by evaluating the PubliclyAccessible field in the instance configuration item. Neptune DB instances and Amazon DocumentDB clusters do not have the PubliclyAccessible flag and cannot be evaluated. However, this control can still generate findings for these resources. You can suppress these findings. The PubliclyAccessible value in the RDS instance configuration indicates whether the DB instance is publicly accessible. When the DB instance is configured with PubliclyAccessible, it is an Internet-facing instance with a publicly resolvable DNS name, which resolves to a public IP address. When the DB instance isn't publicly accessible, it is an internal instance with a DNS name that resolves to a private IP address. Unless you intend for your RDS instance to be publicly accessible, the RDS instance should not be configured with PubliclyAccessible value. Doing so might allow unnecessary traffic to your database instance. REMEDIATION To remove public access from RDS DB instances, see Modifying an Amazon RDS DB instance in the Amazon RDS User Guide. For Public access, choose No. [RDS.3] RDS DB INSTANCES SHOULD HAVE ENCRYPTION AT-REST ENABLED Related requirements: CIS AWS Foundations Benchmark v1.4.0/2.3.1, NIST.800-53.r5 CA-9(1), NIST.800-53.r5 CM-3(6), NIST.800-53.r5 SC-13, NIST.800-53.r5 SC-28, NIST.800-53.r5 SC-28(1), NIST.800-53.r5 SC-7(10), NIST.800-53.r5 SI-7(6) Category: Protect > Data protection > Encryption of data at rest Severity: Medium Resource type: AWS::RDS::DBInstance AWS Config rule: rds-storage-encrypted Schedule type: Change triggered Parameters: None This control checks whether storage encryption is enabled for your Amazon RDS DB instances. This control is intended for RDS DB instances. However, it can also generate findings for Aurora DB instances, Neptune DB instances, and Amazon DocumentDB clusters. If these findings are not useful, then you can suppress them. For an added layer of security for your sensitive data in RDS DB instances, you should configure your RDS DB instances to be encrypted at rest. To encrypt your RDS DB instances and snapshots at rest, enable the encryption option for your RDS DB instances. Data that is encrypted at rest includes the underlying storage for DB instances, its automated backups, read replicas, and snapshots. RDS encrypted DB instances use the open standard AES-256 encryption algorithm to encrypt your data on the server that hosts your RDS DB instances. After your data is encrypted, Amazon RDS handles authentication of access and decryption of your data transparently with a minimal impact on performance. You do not need to modify your database client applications to use encryption. Amazon RDS encryption is currently available for all database engines and storage types. Amazon RDS encryption is available for most DB instance classes. To learn about DB instance classes that do not support Amazon RDS encryption, see Encrypting Amazon RDS resources in the Amazon RDS User Guide. REMEDIATION For information about encrypting DB instances in Amazon RDS, see Encrypting Amazon RDS resources in the Amazon RDS User Guide. [RDS.4] RDS CLUSTER SNAPSHOTS AND DATABASE SNAPSHOTS SHOULD BE ENCRYPTED AT REST Related requirements: NIST.800-53.r5 CA-9(1), NIST.800-53.r5 CM-3(6), NIST.800-53.r5 SC-13, NIST.800-53.r5 SC-28, NIST.800-53.r5 SC-28(1), NIST.800-53.r5 SC-7(10), NIST.800-53.r5 SI-7(6) Category: Protect > Data protection > Encryption of data at rest Severity: Medium Resource type: AWS::RDS::DBClusterSnapshot, AWS::RDS::DBSnapshot AWS Config rule: rds-snapshot-encrypted Schedule type: Change triggered Parameters: None This control checks whether an RDS DB snapshot is encrypted. The control fails if an RDS DB snapshot isn't encrypted. This control is intended for RDS DB instances. However, it can also generate findings for snapshots of Aurora DB instances, Neptune DB instances, and Amazon DocumentDB clusters. If these findings are not useful, then you can suppress them. Encrypting data at rest reduces the risk that an unauthenticated user gets access to data that is stored on disk. Data in RDS snapshots should be encrypted at rest for an added layer of security. REMEDIATION To encrypt an RDS snapshot, see Encrypting Amazon RDS resources in the Amazon RDS User Guide. When you encrypt an RDS DB instance, the encrypted data includes the underlying storage for the instance, its automated backups, read replicas, and snapshots. You can only encrypt an RDS DB instance when you create it, not after the DB instance is created. However, because you can encrypt a copy of an unencrypted snapshot, you can effectively add encryption to an unencrypted DB instance. That is, you can create a snapshot of your DB instance, and then create an encrypted copy of that snapshot. You can then restore a DB instance from the encrypted snapshot, and thus you have an encrypted copy of your original DB instance. [RDS.5] RDS DB INSTANCES SHOULD BE CONFIGURED WITH MULTIPLE AVAILABILITY ZONES Related requirements: NIST.800-53.r5 CP-10, NIST.800-53.r5 CP-6(2), NIST.800-53.r5 SC-36, NIST.800-53.r5 SC-5(2), NIST.800-53.r5 SI-13(5) Category: Recover > Resilience > High availability Severity: Medium Resource type: AWS::RDS::DBInstance AWS Config rule: rds-multi-az-support Schedule type: Change triggered Parameters: None This control checks whether high availability is enabled for your RDS DB instances. RDS DB instances should be configured for multiple Availability Zones (AZs). This ensures the availability of the data stored. Multi-AZ deployments allow for automated failover if there is an issue with AZ availability and during regular RDS maintenance. REMEDIATION To deploy your DB instances in multiple AZs, Modifying a DB instance to be a Multi-AZ DB instance deployment in the Amazon RDS User Guide. [RDS.6] ENHANCED MONITORING SHOULD BE CONFIGURED FOR RDS DB INSTANCES Related requirements: NIST.800-53.r5 CA-7, NIST.800-53.r5 SI-2 Category: Detect > Detection services Severity: Low Resource type: AWS::RDS::DBInstance AWS Config rule: rds-enhanced-monitoring-enabled Schedule type: Change triggered Parameters: None This control checks whether enhanced monitoring is enabled for your RDS DB instances. In Amazon RDS, Enhanced Monitoring enables a more rapid response to performance changes in underlying infrastructure. These performance changes could result in a lack of availability of the data. Enhanced Monitoring provides real-time metrics of the operating system that your RDS DB instance runs on. An agent is installed on the instance. The agent can obtain metrics more accurately than is possible from the hypervisor layer. Enhanced Monitoring metrics are useful when you want to see how different processes or threads on a DB instance use the CPU. For more information, see Enhanced Monitoring in the Amazon RDS User Guide. REMEDIATION For detailed instructions on enabling Enhanced Monitoring for your DB instance, see Setting up for and enabling Enhanced Monitoring in the Amazon RDS User Guide. [RDS.7] RDS CLUSTERS SHOULD HAVE DELETION PROTECTION ENABLED Related requirements: NIST.800-53.r5 CM-3, NIST.800-53.r5 SC-5(2) Category: Protect > Data protection > Data deletion protection Severity: Low Resource type: AWS::RDS::DBCluster AWS Config rule: rds-cluster-deletion-protection-enabled Schedule type: Change triggered Parameters: None This control checks whether an RDS DB cluster has deletion protection enabled. The control fails if an RDS DB cluster doesn't have deletion protection enabled. This control is intended for RDS DB instances. However, it can also generate findings for Aurora DB instances, Neptune DB instances, and Amazon DocumentDB clusters. If these findings are not useful, then you can suppress them. Enabling cluster deletion protection is an additional layer of protection against accidental database deletion or deletion by an unauthorized entity. When deletion protection is enabled, an RDS cluster cannot be deleted. Before a deletion request can succeed, deletion protection must be disabled. REMEDIATION To enable deletion protection for an RDS DB cluster, see Modifying the DB cluster by using the console, CLI, and API in the Amazon RDS User Guide. For Deletion protection, choose Enable deletion protection. [RDS.8] RDS DB INSTANCES SHOULD HAVE DELETION PROTECTION ENABLED Related requirements: NIST.800-53.r5 CM-3, NIST.800-53.r5 SC-5(2), NIST.800-53.r5 SI-13(5) Category: Protect > Data protection > Data deletion protection Severity: Low Resource type: AWS::RDS::DBInstance AWS Config rule: rds-instance-deletion-protection-enabled Schedule type: Change triggered Parameters: * databaseEngines: mariadb,mysql,oracle-ee,oracle-se2,oracle-se1,oracle-se,postgres,sqlserver-ee,sqlserver-se,sqlserver-ex,sqlserver-web This control checks whether your RDS DB instances that use one of the listed database engines have deletion protection enabled. The control fails if an RDS DB instance doesn't have deletion protection enabled. Enabling instance deletion protection is an additional layer of protection against accidental database deletion or deletion by an unauthorized entity. While deletion protection is enabled, an RDS DB instance cannot be deleted. Before a deletion request can succeed, deletion protection must be disabled. REMEDIATION To enable deletion protection for an RDS DB instance, see Modifying an Amazon RDS DB instance in the Amazon RDS User Guide. For Deletion protection, choose Enable deletion protection. [RDS.9] DATABASE LOGGING SHOULD BE ENABLED Related requirements: NIST.800-53.r5 AC-2(4), NIST.800-53.r5 AC-4(26), NIST.800-53.r5 AC-6(9), NIST.800-53.r5 AU-10, NIST.800-53.r5 AU-12, NIST.800-53.r5 AU-2, NIST.800-53.r5 AU-3, NIST.800-53.r5 AU-6(3), NIST.800-53.r5 AU-6(4), NIST.800-53.r5 CA-7, NIST.800-53.r5 SC-7(10), NIST.800-53.r5 SC-7(9), NIST.800-53.r5 SI-3(8), NIST.800-53.r5 SI-4(20), NIST.800-53.r5 SI-7(8) Category: Identify > Logging Severity: Medium Resource type: AWS::RDS::DBInstance AWS Config rule: rds-logging-enabled Schedule type: Change triggered Parameters: None This control checks whether the following logs of Amazon RDS are enabled and sent to Amazon CloudWatch Logs: * Oracle: (Alert, Audit, Trace, Listener) * PostgreSQL: (Postgresql, Upgrade) * MySQL: (Audit, Error, General, SlowQuery) * MariaDB: (Audit, Error, General, SlowQuery) * SQL Server: (Error, Agent) * Aurora: (Audit, Error, General, SlowQuery) * Aurora-MySQL: (Audit, Error, General, SlowQuery) * Aurora-PostgreSQL: (Postgresql, Upgrade). RDS databases should have relevant logs enabled. Database logging provides detailed records of requests made to RDS. Database logs can assist with security and access audits and can help to diagnose availability issues. REMEDIATION To publish RDS database logs to CloudWatch Logs, see Specifying the logs to publish to CloudWatch Logs in the Amazon RDS User Guide. [RDS.10] IAM AUTHENTICATION SHOULD BE CONFIGURED FOR RDS INSTANCES Related requirements: NIST.800-53.r5 AC-2(1), NIST.800-53.r5 AC-3, NIST.800-53.r5 AC-3(15), NIST.800-53.r5 AC-3(7), NIST.800-53.r5 AC-6 Category: Protect > Secure access management > Passwordless authentication Severity: Medium Resource type: AWS::RDS::DBInstance AWS Config rule: rds-instance-iam-authentication-enabled Schedule type: Change triggered Parameters: None This control checks whether an RDS DB instance has IAM database authentication enabled. The control fails if IAM authentication is not configured for RDS DB instances. This control only evaluates RDS instances with the following engine types: mysql, postgres, aurora, aurora-mysql, aurora-postgresql, and mariadb. An RDS instance must also be in one of the following states for a finding to be generated: available, backing-up, storage-optimization, or storage-full. IAM database authentication allows authentication to database instances with an authentication token instead of a password. Network traffic to and from the database is encrypted using SSL. For more information, see IAM database authentication in the Amazon Aurora User Guide. REMEDIATION To activate IAM database authentication on an RDS DB instance, see Enabling and disabling IAM database authentication in the Amazon RDS User Guide. [RDS.11] RDS INSTANCES SHOULD HAVE AUTOMATIC BACKUPS ENABLED Related requirements: NIST.800-53.r5 CP-10, NIST.800-53.r5 CP-6, NIST.800-53.r5 CP-6(1), NIST.800-53.r5 CP-6(2), NIST.800-53.r5 CP-9, NIST.800-53.r5 SC-5(2), NIST.800-53.r5 SI-12, NIST.800-53.r5 SI-13(5) Category: Recover > Resilience > Backups enabled Severity: Medium Resource type: AWS::RDS::DBInstance AWS Config rule: db-instance-backup-enabled Schedule type: Change triggered Parameters: * backupRetentionMinimum: 7 This control checks whether Amazon Relational Database Service instances have automated backups enabled and the backup retention period is greater than or equal to seven days. The control fails if backups are not enabled, and if the retention period is less than 7 days. Backups help you more quickly recover from a security incident and strengthens the resilience of your systems. Amazon RDS provides an easy way to configure daily full instance volume snapshots. For more details on Amazon RDS automated backups, see Working with Backups in the Amazon RDS User Guide. REMEDIATION To enable automated backups on an RDS DB instance, see Enabling automated backups in the Amazon RDS User Guide. [RDS.12] IAM AUTHENTICATION SHOULD BE CONFIGURED FOR RDS CLUSTERS Related requirements: NIST.800-53.r5 AC-2(1), NIST.800-53.r5 AC-3, NIST.800-53.r5 AC-3(15), NIST.800-53.r5 AC-3(7), NIST.800-53.r5 AC-6 Category: Protect > Secure access management > Passwordless authentication Severity: Medium Resource type: AWS::RDS::DBCluster AWS Config rule: rds-cluster-iam-authentication-enabled Schedule type: Change triggered Parameters:None This control checks whether an Amazon RDS DB cluster has IAM database authentication enabled. IAM database authentication allows for password-free authentication to database instances. The authentication uses an authentication token. Network traffic to and from the database is encrypted using SSL. For more information, see IAM database authentication in the Amazon Aurora User Guide. REMEDIATION To enable IAM authentication for a DB cluster, see Enabling and disabling IAM database authentication in the Amazon Aurora User Guide. [RDS.13] RDS AUTOMATIC MINOR VERSION UPGRADES SHOULD BE ENABLED Related requirements: NIST.800-53.r5 SI-2, NIST.800-53.r5 SI-2(2), NIST.800-53.r5 SI-2(4), NIST.800-53.r5 SI-2(5) Category: Detect > Vulnerability and patch management Severity: High Resource type: AWS::RDS::DBInstance AWS Config rule: rds-automatic-minor-version-upgrade-enabled Schedule type: Change triggered Parameters: None This control checks whether automatic minor version upgrades are enabled for the RDS database instance. Enabling automatic minor version upgrades ensures that the latest minor version updates to the relational database management system (RDBMS) are installed. These upgrades might include security patches and bug fixes. Keeping up to date with patch installation is an important step in securing systems. REMEDIATION To enable automatic minor version upgrades for an existing DB instance, see Modifying an Amazon RDS DB instance in the Amazon RDS User Guide. For Auto minor version upgrade, select Yes. [RDS.14] AMAZON AURORA CLUSTERS SHOULD HAVE BACKTRACKING ENABLED Related requirements: NIST.800-53.r5 CP-10, NIST.800-53.r5 CP-6, NIST.800-53.r5 CP-6(1), NIST.800-53.r5 CP-6(2), NIST.800-53.r5 CP-9, NIST.800-53.r5 SI-13(5) Category: Recover > Resilience > Backups enabled Severity: Medium Resource type: AWS::RDS::DBCluster AWS Config rule: aurora-mysql-backtracking-enabled Schedule type: Change triggered Parameters: None This control checks whether Amazon Aurora clusters have backtracking enabled. Backups help you to recover more quickly from a security incident. They also strengthens the resilience of your systems. Aurora backtracking reduces the time to recover a database to a point in time. It does not require a database restore to do so. For more information about backtracking in Aurora, see Backtracking an Aurora DB cluster in the Amazon Aurora User Guide. REMEDIATION For detailed instructions on how to enable Aurora backtracking, see Configuring backtracking in the Amazon Aurora User Guide. Note that you cannot enable backtracking on an existing cluster. Instead, you can create a clone that has backtracking enabled. For more information about the limitations of Aurora backtracking, see the list of limitations in Overview of backtracking. For information about pricing for backtracking, see the Aurora pricing page. [RDS.15] RDS DB CLUSTERS SHOULD BE CONFIGURED FOR MULTIPLE AVAILABILITY ZONES Related requirements: NIST.800-53.r5 CP-10, NIST.800-53.r5 CP-6(2), NIST.800-53.r5 SC-36, NIST.800-53.r5 SC-5(2), NIST.800-53.r5 SI-13(5) Category: Recover > Resilience > High availability Severity: Medium Resource type: AWS::RDS::DBCluster AWS Config rule: rds-cluster-multi-az-enabled Schedule type: Change triggered Parameters: None This control checks whether high availability is enabled for your RDS DB clusters. The control fails if an RDS DB cluster isn't deployed in multiple Availability Zones (AZs). RDS DB clusters should be configured for multiple AZs to ensure availability of stored data. Deployment to multiple AZs allows for automated failover in the event of an AZ availability issue and during regular RDS maintenance events. REMEDIATION To deploy your DB clusters in multiple AZs, Modifying a DB instance to be a Multi-AZ DB instance deployment in the Amazon RDS User Guide. Remediation steps differ for Aurora global databases. To configure multiple Availability Zones for an Aurora global database, select your DB cluster. Then, choose Actions and Add reader, and specify multiple AZs. For more information, see Adding Aurora Replicas to a DB cluster in the Amazon Aurora User Guide. [RDS.16] RDS DB CLUSTERS SHOULD BE CONFIGURED TO COPY TAGS TO SNAPSHOTS Related requirements: NIST.800-53.r5 CA-9(1), NIST.800-53.r5 CM-2, NIST.800-53.r5 CM-2(2) Category: Identify > Inventory Severity: Low Resource type: AWS::RDS::DBCluster AWS Config rule: rds-cluster-copy-tags-to-snapshots-enabled (custom Security Hub rule) Schedule type: Change triggered Parameters: None This control checks whether RDS DB clusters are configured to copy all tags to snapshots when the snapshots are created. Identification and inventory of your IT assets is a crucial aspect of governance and security. You need to have visibility of all your RDS DB clusters so that you can assess their security posture and take action on potential areas of weakness. Snapshots should be tagged in the same way as their parent RDS database clusters. Enabling this setting ensures that snapshots inherit the tags of their parent database clusters. REMEDIATION To automatically copy tags to snapshots for an RDS DB cluster, see Modifying the DB cluster by using the console, CLI, and API in the Amazon Aurora User Guide. Select Copy tags to snapshots. [RDS.17] RDS DB INSTANCES SHOULD BE CONFIGURED TO COPY TAGS TO SNAPSHOTS Related requirements: NIST.800-53.r5 CA-9(1), NIST.800-53.r5 CM-2, NIST.800-53.r5 CM-2(2) Category: Identify > Inventory Severity: Low Resource type: AWS::RDS::DBInstance AWS Config rule: rds-instance-copy-tags-to-snapshots-enabled (custom Security Hub rule) Schedule type: Change triggered Parameters: None This control checks whether RDS DB instances are configured to copy all tags to snapshots when the snapshots are created. Identification and inventory of your IT assets is a crucial aspect of governance and security. You need to have visibility of all your RDS DB instances so that you can assess their security posture and take action on potential areas of weakness. Snapshots should be tagged in the same way as their parent RDS database instances. Enabling this setting ensures that snapshots inherit the tags of their parent database instances. REMEDIATION To automatically copy tags to snapshots for an RDS DB instance, see Modifying an Amazon RDS DB instance in the Amazon RDS User Guide. Select Copy tags to snapshots. [RDS.18] RDS INSTANCES SHOULD BE DEPLOYED IN A VPC Related requirements: NIST.800-53.r5 AC-21, NIST.800-53.r5 AC-3, NIST.800-53.r5 AC-3(7), NIST.800-53.r5 AC-4, NIST.800-53.r5 AC-4(21), NIST.800-53.r5 AC-6, NIST.800-53.r5 SC-7, NIST.800-53.r5 SC-7(11), NIST.800-53.r5 SC-7(16), NIST.800-53.r5 SC-7(20), NIST.800-53.r5 SC-7(21), NIST.800-53.r5 SC-7(3), NIST.800-53.r5 SC-7(4), NIST.800-53.r5 SC-7(9) Category: Protect > Secure network configuration > Resources within VPC Severity: High Resource type: AWS::RDS::DBInstance AWS Config rule: rds-deployed-in-vpc (custom Security Hub rule) Schedule type: Change triggered Parameters: None This control checks whether an Amazon RDS instance is deployed on an EC2-VPC. VPCs provide a number of network controls to secure access to RDS resources. These controls include VPC Endpoints, network ACLs, and security groups. To take advantage of these controls, we recommend that you create your RDS instances on an EC2-VPC. REMEDIATION For instructions on moving RDS instances to a VPC, see Updating the VPC for a DB instance in the Amazon RDS User Guide. [RDS.19] AN RDS EVENT NOTIFICATIONS SUBSCRIPTION SHOULD BE CONFIGURED FOR CRITICAL CLUSTER EVENTS IMPORTANT Security Hub will change the title of this control in August 2023. For more information, see Change log for Security Hub controls. Related requirements: NIST.800-53.r5 CA-7, NIST.800-53.r5 SI-2 Category: Detect > Detection services > Application monitoring Severity: Low Resource type: AWS::RDS::EventSubscription AWS Config rule: rds-cluster-event-notifications-configured (custom Security Hub rule) Schedule type: Change triggered Parameters: None This control checks whether an existing Amazon RDS event subscription for database clusters has notifications enabled for the following source type and event category key-value pairs: DBCluster: ["maintenance","failure"] The control passes if there are no existing event subscriptions in your account. RDS event notifications uses Amazon SNS to make you aware of changes in the availability or configuration of your RDS resources. These notifications allow for rapid response. For additional information about RDS event notifications, see Using Amazon RDS event notification in the Amazon RDS User Guide. REMEDIATION To subscribe to RDS cluster event notifications, see Subscribing to Amazon RDS event notification in the Amazon RDS User Guide. Use the following values: Field Value Source type Clusters Clusters to include All clusters Event categories to include Select specific event categories or All event categories [RDS.20] AN RDS EVENT NOTIFICATIONS SUBSCRIPTION SHOULD BE CONFIGURED FOR CRITICAL DATABASE INSTANCE EVENTS IMPORTANT Security Hub will change the title of this control in August 2023. For more information, see Change log for Security Hub controls. Related requirements: NIST.800-53.r5 CA-7, NIST.800-53.r5 SI-2 Category: Detect > Detection services > Application monitoring Severity: Low Resource type: AWS::RDS::EventSubscription AWS Config rule: rds-instance-event-notifications-configured (custom Security Hub rule) Schedule type: Change triggered Parameters: None This control checks whether an existing Amazon RDS event subscription for database instances has notifications enabled for the following source type and event category key-value pairs: DBInstance: ["maintenance","configuration change","failure"] The control passes if there are no existing event subscriptions in your account. RDS event notifications use Amazon SNS to make you aware of changes in the availability or configuration of your RDS resources. These notifications allow for rapid response. For additional information about RDS event notifications, see Using Amazon RDS event notification in the Amazon RDS User Guide. REMEDIATION To subscribe to RDS instance event notifications, see Subscribing to Amazon RDS event notification in the Amazon RDS User Guide. Use the following values: Field Value Source type Instances Instances to include All instances Event categories to include Select specific event categories or All event categories [RDS.21] AN RDS EVENT NOTIFICATIONS SUBSCRIPTION SHOULD BE CONFIGURED FOR CRITICAL DATABASE PARAMETER GROUP EVENTS Related requirements: NIST.800-53.r5 CA-7, NIST.800-53.r5 SI-2 Category: Detect > Detection services > Application monitoring Severity: Low Resource type: AWS::RDS::EventSubscription AWS Config rule: rds-pg-event-notifications-configured (custom Security Hub rule) Schedule type: Change triggered Parameters: None This control checks whether an Amazon RDS event subscription exists with notifications enabled for the following source type, event category key-value pairs. DBParameterGroup: ["configuration change"] RDS event notifications use Amazon SNS to make you aware of changes in the availability or configuration of your RDS resources. These notifications allow for rapid response. For additional information about RDS event notifications, see Using Amazon RDS event notification in the Amazon RDS User Guide. REMEDIATION To subscribe to RDS database parameter group event notifications, see Subscribing to Amazon RDS event notification in the Amazon RDS User Guide. Use the following values: Field Value Source type Parameter groups Parameter groups to include All parameter groups Event categories to include Select specific event categories or All event categories [RDS.22] AN RDS EVENT NOTIFICATIONS SUBSCRIPTION SHOULD BE CONFIGURED FOR CRITICAL DATABASE SECURITY GROUP EVENTS Related requirements: NIST.800-53.r5 CA-7, NIST.800-53.r5 SI-2 Category: Detect > Detection Services > Application monitoring Severity: Low Resource type: AWS::RDS::EventSubscription AWS Config rule: rds-sg-event-notifications-configured (custom Security Hub rule) Schedule type: Change triggered Parameters: None This control checks whether an Amazon RDS event subscription exists with notifications enabled for the following source type, event category key-value pairs. DBSecurityGroup: ["configuration change","failure"] RDS event notifications use Amazon SNS to make you aware of changes in the availability or configuration of your RDS resources. These notifications allow for a rapid response. For additional information about RDS event notifications, see Using Amazon RDS event notification in the Amazon RDS User Guide. REMEDIATION To subscribe to RDS instance event notifications, see Subscribing to Amazon RDS event notification in the Amazon RDS User Guide. Use the following values: Field Value Source type Security groups Security groups to include All security groups Event categories to include Select specific event categories or All event categories [RDS.23] RDS INSTANCES SHOULD NOT USE A DATABASE ENGINE DEFAULT PORT Related requirements: NIST.800-53.r5 AC-4, NIST.800-53.r5 AC-4(21), NIST.800-53.r5 SC-7, NIST.800-53.r5 SC-7(11), NIST.800-53.r5 SC-7(16), NIST.800-53.r5 SC-7(21), NIST.800-53.r5 SC-7(4), NIST.800-53.r5 SC-7(5) Category: Protect > Secure network configuration Severity: Low Resource type: AWS::RDS::DBInstance AWS Config rule: rds-no-default-ports (custom Security Hub rule) Schedule type: Change triggered Parameters: None This control checks whether an RDS cluster or instance uses a port other than the default port of the database engine. The control fails if the RDS cluster or instance uses the default port. If you use a known port to deploy an RDS cluster or instance, an attacker can guess information about the cluster or instance. The attacker can use this information in conjunction with other information to connect to an RDS cluster or instance or gain additional information about your application. When you change the port, you must also update the existing connection strings that were used to connect to the old port. You should also check the security group of the DB instance to ensure that it includes an ingress rule that allows connectivity on the new port. REMEDIATION To modify the default port of an existing RDS DB instance, see Modifying an Amazon RDS DB instance in the Amazon RDS User Guide. To modify the default port of an existing RDS DB cluster, see Modifying the DB cluster by using the console, CLI, and API in the Amazon Aurora User Guide. For Database port, change the port value to a non-default value. [RDS.24] RDS DATABASE CLUSTERS SHOULD USE A CUSTOM ADMINISTRATOR USERNAME Related requirements: NIST.800-53.r5 CA-9(1), NIST.800-53.r5 CM-2 Category: Identify > Resource Configuration Severity: Medium Resource type: AWS::RDS::DBCluster AWS Config rule: rds-cluster-default-admin-check Schedule type: Change triggered Parameters: None This control checks whether an Amazon RDS database cluster has changed the admin username from its default value. The control does not apply to engines of the type neptune (Neptune DB) or docdb (DocumentDB). This rule will fail if the admin username is set to the default value. When creating an Amazon RDS database, you should change the default admin username to a unique value. Default usernames are public knowledge and should be changed during RDS database creation. Changing the default usernames reduces the risk of unintended access. REMEDIATION For changing the admin username associated with the Amazon RDS database cluster, create a new RDS database cluster and change the default admin username while creating the database. [RDS.25] RDS DATABASE INSTANCES SHOULD USE A CUSTOM ADMINISTRATOR USERNAME Related requirements: NIST.800-53.r5 CA-9(1), NIST.800-53.r5 CM-2 Category: Identify > Resource Configuration Severity: Medium Resource type: AWS::RDS::DBInstance AWS Config rule: rds-instance-default-admin-check Schedule type: Change triggered Parameters: None This control checks whether you've changed the administrative username for Amazon Relational Database Service (Amazon RDS) database instances from the default value. The control does not apply to engines of the type neptune (Neptune DB) or docdb (DocumentDB). The control fails if the administrative username is set to the default value. Default administrative usernames on Amazon RDS databases are public knowledge. When creating an Amazon RDS database, you should change the default administrative username to a unique value to reduce the risk of unintended access. REMEDIATION To change the administrative username associated with an RDS database instance, first create a new RDS database instance. Change the default administrative username while creating the database. [RDS.26] RDS DB INSTANCES SHOULD BE COVERED BY A BACKUP PLAN Category: Recover > Resilience > Backups enabled Related requirements: NIST.800-53.r5 CP-10, NIST.800-53.r5 CP-6, NIST.800-53.r5 CP-6(1), NIST.800-53.r5 CP-6(2), NIST.800-53.r5 CP-9, NIST.800-53.r5 SC-5(2), NIST.800-53.r5 SI-12, NIST.800-53.r5 SI-13(5) Severity: Medium Resource type: AWS::RDS::DBInstance AWS Config rule: rds-resources-protected-by-backup-plan Schedule type: Periodic Parameters: None This control evaluates if Amazon RDS DB instances are covered by a backup plan. This control fails if an RDS DB instance isn't covered by a backup plan. AWS Backup is a fully managed backup service that centralizes and automates the backing up of data across AWS services. With AWS Backup, you can create backup policies called backup plans. You can use these plans to define your backup requirements, such as how frequently to back up your data and how long to retain those backups. Including RDS DB instances in a backup plan helps you protect your data from unintended loss or deletion. REMEDIATION To add an RDS DB instance to an AWS Backup backup plan, see Assigning resources to a backup plan in the AWS Backup Developer Guide. [RDS.27] RDS DB CLUSTERS SHOULD BE ENCRYPTED AT REST Related requirements: NIST.800-53.r5 CA-9(1), NIST.800-53.r5 CM-3(6), NIST.800-53.r5 SC-13, NIST.800-53.r5 SC-28, NIST.800-53.r5 SC-28(1), NIST.800-53.r5 SC-7(10), NIST.800-53.r5 SI-7(6) Category: Protect > Data protection > Encryption of data at rest Severity: Medium Resource type: AWS::RDS::DBCluster AWS Config rule: rds-cluster-encrypted-at-rest Schedule type: Change triggered Parameters: None This control checks if an RDS DB cluster is encrypted at rest. The control fails if an RDS DB cluster isn't encrypted at rest. Data at rest refers to any data that's stored in persistent, non-volatile storage for any duration. Encryption helps you protect the confidentiality of such data, reducing the risk that an unauthorized user can access it. Encrypting your RDS DB clusters protects your data and metadata against unauthorized access. It also fulfills compliance requirements for data-at-rest encryption of production file systems. REMEDIATION You can enable encryption at rest when you create an RDS DB cluster. You can't change encryption settings after creating a cluster. For more information, see Encrypting an Amazon Aurora DB cluster in the Amazon Aurora User Guide. Javascript is disabled or is unavailable in your browser. To use the Amazon Web Services Documentation, Javascript must be enabled. Please refer to your browser's Help pages for instructions. Document Conventions OpenSearch Service controls Amazon Redshift controls Did this page help you? - Yes Thanks for letting us know we're doing a good job! If you've got a moment, please tell us what we did right so we can do more of it. Did this page help you? - No Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better. DID THIS PAGE HELP YOU? Yes No Provide feedback NEXT TOPIC: Amazon Redshift controls PREVIOUS TOPIC: OpenSearch Service controls NEED HELP? * Connect with an AWS IQ expert PrivacySite termsCookie preferences © 2023, Amazon Web Services, Inc. or its affiliates. All rights reserved. ON THIS PAGE * [RDS.1] RDS snapshot should be private * [RDS.2] RDS DB Instances should prohibit public access, as determined by the PubliclyAccessible AWS Configuration * [RDS.3] RDS DB instances should have encryption at-rest enabled * [RDS.4] RDS cluster snapshots and database snapshots should be encrypted at rest * [RDS.5] RDS DB instances should be configured with multiple Availability Zones * [RDS.6] Enhanced monitoring should be configured for RDS DB instances * [RDS.7] RDS clusters should have deletion protection enabled * [RDS.8] RDS DB instances should have deletion protection enabled * [RDS.9] Database logging should be enabled * [RDS.10] IAM authentication should be configured for RDS instances * [RDS.11] RDS instances should have automatic backups enabled * [RDS.12] IAM authentication should be configured for RDS clusters * [RDS.13] RDS automatic minor version upgrades should be enabled * [RDS.14] Amazon Aurora clusters should have backtracking enabled * [RDS.15] RDS DB clusters should be configured for multiple Availability Zones * [RDS.16] RDS DB clusters should be configured to copy tags to snapshots * [RDS.17] RDS DB instances should be configured to copy tags to snapshots * [RDS.18] RDS instances should be deployed in a VPC * [RDS.19] An RDS event notifications subscription should be configured for critical cluster events * [RDS.20] An RDS event notifications subscription should be configured for critical database instance events * [RDS.21] An RDS event notifications subscription should be configured for critical database parameter group events * [RDS.22] An RDS event notifications subscription should be configured for critical database security group events * [RDS.23] RDS instances should not use a database engine default port * [RDS.24] RDS Database clusters should use a custom administrator username * [RDS.25] RDS database instances should use a custom administrator username * [RDS.26] RDS DB instances should be covered by a backup plan * [RDS.27] RDS DB clusters should be encrypted at rest DID THIS PAGE HELP YOU? - NO Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better. Feedback