Control: AWS > PCI v3.2.1 > RDS > 2 RDS DB Instances should prohibit public access
This control checks whether RDS instances are publicly accessible by evaluating the publiclyAccessible field in the instance configuration item. The value of publiclyAccessible indicates whether the DB instance is publicly accessible. When the DB instance is publicly accessible, it is an Internet-facing instance with a publicly resolvable DNS name, which resolves to a public IP address. When the DB instance isn't publicly accessible, it is an internal instance with a DNS name that resolves to a private IP address.
The control does not check VPC subnet routing settings or the Security Group rules. You should also ensure VPC subnet routing does not allow public access, and that the security group inbound rule associated with the RDS instance does not allow unrestricted access (0.0.0.0/0). You should also ensure that access to your RDS instance configuration is limited to only authorized users by restricting users' IAM permissions to modify RDS instances settings and resources.
Remediation
To remove public access for Amazon RDS Databases
- Open the Amazon RDS console.
- Navigate to Databases and then choose your public database.
- Choose Modify.
- Scroll to Network & Security.
- For
Public accessibility
, choose No. - Scroll to the bottom and then choose Continue.
- Under Scheduling of modifications, choose Apply immediately.
- Choose Modify DB Instance.
PCI requirement(s): 1.2.1, 1.3.1, 1.3.2, 1.3.4, 1.3.6, 7.2.1
Resource Types
This control targets the following resource types:
Category
In Your Workspace
Developers
- tmod:@turbot/aws-pciv3-2-1#/control/types/rdsDbInstanceProhibitPublicAccess
- tmod:@turbot/turbot#/control/categories/compliancePci
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-pciv3-2-1#/control/types/rdsDbInstanceProhibitPublicAccess"
Get Controls