More Info:

Checks if Amazon DocumentDB manual cluster snapshots are public. The rule is NON_COMPLIANT if any Amazon DocumentDB manual cluster snapshots are public.

Risk Level

Medium

Address

Observability

Compliance Standards

CBP,SEBI

Triage and Remediation

Remediation

To remediate the issue of DocumentDB Cluster Snapshots being public in AWS RDS using the AWS Management Console, follow these steps:

  1. Login to AWS Console: Go to the AWS Management Console (https://aws.amazon.com/console/) and log in with your credentials.

  2. Navigate to DocumentDB Service: Click on the “Services” dropdown menu at the top left corner of the console, then select “DocumentDB” under the Database category.

  3. Select DocumentDB Cluster: From the DocumentDB dashboard, select the DocumentDB cluster for which you want to remediate the public snapshot issue.

  4. Modify Snapshot Settings:

    • In the left-hand navigation pane, click on “Snapshots” to view the list of snapshots associated with the selected cluster.
    • Identify the public snapshot(s) that need to be remediated.
    • Select the public snapshot by clicking on the checkbox next to it.
  5. Update Snapshot Permissions:

    • Click on the “Actions” dropdown menu above the list of snapshots.
    • Select “Modify Snapshot Attribute” from the dropdown menu.
    • In the Modify Snapshot Attribute window, uncheck the option for “Public” to make the snapshot private.
    • Click on the “Modify Snapshot Attribute” button to save the changes.
  6. Verify Changes:

    • Once the modification is complete, verify that the snapshot is no longer public by checking the snapshot permissions.
    • You can also try accessing the snapshot URL to confirm that it is no longer accessible publicly.
  7. Repeat for Other Public Snapshots: If there are multiple public snapshots across different clusters, repeat the above steps for each affected snapshot to ensure all snapshots are private.

By following these steps, you can remediate the issue of DocumentDB Cluster Snapshots being public in AWS RDS using the AWS Management Console.