More Info:

Your Redshift clusters should be provisioned within the AWS EC2-VPC platform instead of EC2-Classic platform (outdated) for better flexibility and control over clusters security, traffic routing, availability and more.

Risk Level

Medium

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration of launching Redshift clusters outside of a VPC in AWS, follow these steps using the AWS Management Console:

  1. Create a VPC (Virtual Private Cloud):

    • Go to the AWS Management Console and navigate to the VPC dashboard.
    • Click on “Create VPC” and provide the necessary details like VPC name, CIDR block, and other configurations.
    • Create at least one subnet within the VPC for your Redshift cluster.
  2. Modify Redshift Cluster Configuration:

    • Go to the Amazon Redshift console.
    • Select the Redshift cluster that is not within a VPC.
    • Click on the “Cluster” actions dropdown and select “Modify”.
    • In the “Network and security” section, choose the VPC and the subnet you created in step 1.
    • Save the changes.
  3. Verify the Configuration:

    • Once the modification is complete, verify that the Redshift cluster is now launched within the VPC.
    • Check the VPC ID and subnet ID associated with the Redshift cluster to ensure it is within the desired VPC.
  4. Update Security Group Rules:

    • Update the security group rules associated with the Redshift cluster to allow necessary inbound and outbound traffic within the VPC.
  5. Test the Redshift Cluster:

    • After making these changes, test the Redshift cluster to ensure it is functioning as expected within the VPC.

By following these steps, you can remediate the misconfiguration of launching Redshift clusters outside of a VPC in AWS and ensure that your Redshift cluster is securely deployed within a VPC.

Additional Reading: