Skip to main content

RDS Instance Backup Transport is not Encrypted

Overview

Checks if the RDS instance's client connections (SQL Server and PostgreSQL) are encrypted. An unencrypted instance allows for sensitive information at transit to be exposed to threats, it's important to ensure the encryption feature is enabled to meet security/compliance requirements. Typically SSL/TSL connections are used to provide a level of security that encrypts data being transferred between the DB Instance and the client.

Vendor

AWS

Cloud Service

RDS

References

https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_DBInstance.html, https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/SQLServer.Concepts.General.SSL.Using.html, https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/PostgreSQL.Concepts.General.SSL.html, https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Security.html#AuroraMySQL.Security.SSL.RequireSSL:~:text=MySQL%20DB%20clusters-,Requiring%20an%20SSL/TLS%20connection%20to%20an%20Aurora%20MySQL%20DB%20cluster,-You%20can%20require, https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Appendix.Oracle.Options.SSL.html#Appendix.Oracle.Options.SSL.OptionGroup:~:text=Adding%20the%20SSL%20option, https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/AuroraPostgreSQL.Security.html#:~:text=sslmode%3Dverify%2Dfull%22-,Requiring%20an%20SSL/TLS%20connection%20to%20an%20Aurora%20PostgreSQL%20DB%20cluster,-You%20can%20require

Severity

3

Item Types

AWS::RDS::DBInstance