AWS Misconfigurations
RDS Audit
Checks performed
- Aurora DB Clusters Should Have Recovery Point
- Aurora DB Clusters Should Be Protected By Backup Plan
- Encryption Should Be Enabled For Amazon Athena Group
- Cluster Deletion Protection Should Be Enabled
- DMS Automatic Minor Version Upgrades Enabled
- DMS Replication Auto Minor Version Upgrade Should Be Enabled
- DMS Replication Should Not Be Public
- DMS Replication Task Source DB Should Have Logging Enabled
- DMS Replication Task Target DB Should Have Logging Enabled
- Database Migration Service Endpoints Should Have SSL Configuration
- DocDB Cluster Audit Logging Should Be Enabled
- Document DB Cluster Should Have Backup Retention Check
- DocumentDB Cluster Should Have Deletion Protection Enabled
- DocumentDB Clusters Should Be Encrypted
- DocumentDB Custer Snapshots Should Not Be Public
- MSK Cluster Encryption In Transit Should Be Enabled
- MySQL Aurora Logs Should Be Enabled
- Neptune DB Cluster Should Have Backup Retention Check
- Neptune Cluster Should Have CloudWatch Log Exports Enabled
- Neptune Cluster Should Have Copy Tags For Snapshots Enabled
- Neptune DB Cluster Should Have Deletion Protection Enabled
- Neptune DB Clusters Storage Encryption Should Be Enabled
- Neptune Clusters IAM Database Authentication Should Be Enabled
- Neptune Cluster Has IAM Database Authentication Should Be Enabled
- Neptune Clusters Snapshots Should Encrypted
- Neptune DB Cluster Snapshot Should Not Be Public
- Backtrack Feature Should Be Enabled
- Accessibility Should Be Well-defined in Aurora Clusters
- Auto Minor Version Upgrade flag Should Be Enabled
- Automated Backups Should Be Enabled
- Backup Retention Duration Should Be Present
- RDS Instances Should Make Use of Copy Tags
- RDS Instances Should Use Latest Generation of Instance Classes
- RDS Instances Should Not Allow Unrestricted In/Outbound Access
- RDS Database Instances Should Not Use Default Ports
- AWS Deprecated RDS Versions In Use
- RDS Instance Should Be of Desired Type
- Use Customer-Managed Keys instead of AWS-managed Keys
- RDS Instances Should Have Encryption Enabled
- Enhanced Monitoring Should Be Enabled For RDS Instances
- Event Notifications Should Be Enabled
- Event Notifications Should Be Enabled
- RDS Databases Should Have Free Storage Space
- General Purpose SSDs Should Be Used Instead of IOPS SSDs
- IAM DB authentication Should Be Enabled
- RDS instances Should Not Be Idle
- RDS Instance Count Should Not Exceed Limit
- Instance Deletion Protection Should Be Enabled
- Event Notification Subscriptions Should Be Enabled
- RDS DB Instances Should Not Be Provisioned in VPC Public Subnets
- RDS Should Have Backup Recovery Point Created
- Renew RDS Reserved Instances Before Expiration (7 days)
- Renew RDS Reserved Instances Before Expiration (30 days)