More Info:

This rule checks if an Amazon Neptune cluster has AWS Identity and Access Management (IAM) database authentication enabled. The rule is NON_COMPLIANT if an Amazon Neptune cluster does not have IAM database authentication enabled.

Risk Level

High

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration of IAM Database Authentication not being enabled for an AWS RDS Neptune cluster, follow these steps using the AWS Management Console:

  1. Login to AWS Console: Go to the AWS Management Console (https://aws.amazon.com/) and login using your credentials.

  2. Navigate to RDS Service: Click on the “Services” dropdown menu at the top and select “RDS” under the Database category.

  3. Select Neptune Cluster: From the list of RDS database instances, select the Neptune cluster for which you want to enable IAM Database Authentication.

  4. Modify Cluster: In the cluster details page, click on the “Modify” button at the top to make changes to the cluster settings.

  5. Enable IAM Database Authentication: Scroll down to the “Additional configuration” section, find the “IAM Database Authentication” option, and set it to “Enabled”.

  6. Apply Changes: Scroll to the bottom of the page and click on the “Continue” button.

  7. Review and Apply Changes: Review the changes you are about to make and click on the “Modify cluster” button to apply the changes.

  8. Wait for Modification to Complete: The modification process may take a few minutes to complete. You can track the progress on the cluster details page.

  9. Verify IAM Database Authentication: Once the modification is complete, go back to the cluster details page and verify that IAM Database Authentication is now enabled for the Neptune cluster.

By following these steps, you have successfully remediated the misconfiguration of IAM Database Authentication not being enabled for your AWS RDS Neptune cluster using the AWS Management Console.