More Info:

Ensure that Read Replica Instances are not publicly accessible to prevent private data from being exposed.

Risk Level

High

Address

Security

Compliance Standards

HITRUST, GDPR, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

Sure, here are the step-by-step instructions to remediate the misconfiguration “Read Replica Instances Should Not Be Public” for GCP using the GCP console:

  1. Open the GCP Console and navigate to the Cloud SQL Instances page.
  2. Click on the name of the Cloud SQL instance that has the public read replica.
  3. In the left-hand menu, click on “Replicas”.
  4. Identify the public read replica instance and click on its name.
  5. In the left-hand menu, click on “Connections”.
  6. Under “Authorized networks”, click on the “Edit” button.
  7. Remove any IP addresses or ranges that are not authorized to access the replica instance.
  8. Click “Save” to save the changes.

Once you have completed these steps, the read replica instance will no longer be public and will only be accessible by authorized networks.