More Info:

Ensure DMS replication instance in not public

Risk Level

High

Address

Observability

Compliance Standards

HITRUST,CISEKS,SOC2,NISTCSF,PCIDSS,SEBI,RBI_MD_ITF,RBI_UCB

Triage and Remediation

Remediation

To remediate the misconfiguration of DMS Replication being public for AWS RDS using the AWS console, follow these steps:

  1. Access AWS Management Console: Go to the AWS Management Console at https://aws.amazon.com/ and log in to your account.

  2. Navigate to the Amazon RDS Console: Click on the “Services” dropdown menu at the top left corner of the console, then select “RDS” under the Database category.

  3. Select the RDS Instance: From the list of RDS instances, select the instance that is being replicated using DMS.

  4. Modify Security Group: In the details page of the selected RDS instance, scroll down to the “Security” section and click on the security group that is associated with the instance.

  5. Edit Inbound Rules: In the security group settings, locate the inbound rules that allow public access to the DMS replication. By default, DMS replication should not be public.

  6. Update Security Group Rules: Remove any inbound rules that allow public access to the DMS replication endpoint. You can either modify the existing rule to restrict access to specific IP ranges or completely remove the rule if it is not required.

  7. Save Changes: After updating the security group rules, save the changes to apply the new configuration.

  8. Verify Configuration: Double-check the security group settings to ensure that only authorized entities have access to the DMS replication endpoint.

By following these steps, you can remediate the misconfiguration of DMS Replication being public for AWS RDS using the AWS console and ensure that your RDS instance is secure.