More Info:

Redshift clusters should not be launched into the public cloud. Unless there is a specific business requirement, Redshift clusters should not have a public endpoint and should be accessed from within a VPC only.

Risk Level

High

Address

Security

Compliance Standards

HIPAA

Triage and Remediation

Remediation

To remediate the issue of Redshift being publicly accessible in AWS, you can follow these steps using the AWS Management Console:

  1. Navigate to the AWS Redshift Console:

    • Go to the AWS Management Console and navigate to the Amazon Redshift dashboard.
  2. Identify the Cluster:

    • Identify the Redshift cluster that is publicly accessible and note down the Security Group associated with it.
  3. Navigate to the EC2 Dashboard:

    • Go to the EC2 dashboard by clicking on ‘Services’ in the top left corner, then selecting ‘EC2’ under the ‘Compute’ section.
  4. Select Security Groups:

    • In the EC2 dashboard, click on ‘Security Groups’ in the left-hand menu to view all the security groups.
  5. Identify the Security Group:

    • Find the Security Group that is associated with the Redshift cluster identified earlier.
  6. Edit Security Group Inbound Rules:

    • Select the Security Group, and click on the ‘Inbound Rules’ tab at the bottom.
  7. Remove Public Access:

    • Look for the rule that allows public access to the Redshift cluster (usually port 5439 for Redshift) and delete it.
    • If there is a rule with a source of 0.0.0.0/0 or ::/0, remove it to restrict access.
  8. Apply Changes:

    • Click on the ‘Save rules’ button to apply the changes to the Security Group.
  9. Verify Changes:

    • Go back to the Redshift dashboard and ensure that the cluster is no longer publicly accessible.

By following these steps, you have successfully remediated the issue of Redshift being publicly accessible in AWS by updating the Security Group rules to restrict access only to authorized sources.

Additional Reading: