More Info:

Amazon Redshift clusters should not be publicly accessible in order to minimise security risks.

Risk Level

High

Address

Security

Compliance Standards

HIPAA, NIST, PCIDSS, HITRUST, SOC2, GDPR, NISTCSF, FedRAMP

Triage and Remediation

Remediation

To remediate the issue of an AWS Redshift cluster being publicly accessible, follow these steps using the AWS Management Console:

  1. Login to AWS Console: Go to the AWS Management Console (https://aws.amazon.com/) and login with your credentials.

  2. Navigate to Amazon Redshift: From the AWS Management Console, navigate to the Amazon Redshift service.

  3. Select the Redshift Cluster: In the Amazon Redshift dashboard, select the Redshift cluster that is publicly accessible.

  4. Modify Cluster: Click on the cluster that you want to modify to access its details.

  5. Modify Cluster Settings: In the cluster details page, click on the “Modify” button to change the cluster settings.

  6. Update Cluster Security Group: Scroll down to the Network and Security section and locate the “VPC security groups” setting.

  7. Edit Security Groups: Click on the “Edit” button next to the security group associated with the Redshift cluster.

  8. Remove Public Ingress Rules: In the security group settings, remove any inbound rules that allow traffic from sources outside of your VPC or trusted networks.

  9. Save Changes: Once you have removed the public ingress rules, click on the “Save” button to apply the changes.

  10. Verify Changes: After saving the changes, verify that the Redshift cluster is no longer publicly accessible by checking the cluster’s endpoint and ensuring it is not accessible from outside networks.

By following these steps, you will remediate the misconfiguration of having an AWS Redshift cluster publicly accessible.

Additional Reading: