RDS Snapshot Exposed to Public or Untrusted Account
Overview
RDS database snapshots often contain sensitive information. Anyone in control of a AWS account with access to this snapshot can view all of the data in the snapshot by copying it to their account and/or creating a new RDS instance from this snapshot.
Consider deleting the snapshot if it is no longer needed or refer to the AWS Documentation to change its visibility to private and remove any untrusted accounts.
Vendor
AWS
Cloud Service
RDS
Input
{"trustAllConnectedAccounts":{"label":"Trust All Known Accounts","value":true,"type":"boolean","helpText":"If true, all AWS Accounts known to Cloud Defense will be trusted and therefore ignored if found by this check, in addition to any accounts in Trusted Accounts."},"trustedAccountIds":{"label":"Trusted AWS Account IDs","helpText":"A list of AWS Account IDs to trust and therefore ignore if found by this check.","value":[],"type":"string[]"}}
Related Requirements
PCI DSS 1.2.1, PCI DSS 1.3.1, PCI DSS 1.3.4, PCI DSS 1.3.6, PCI DSS 7.2.1
Related Controls
RDS.1
References
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ShareSnapshot.html
Severity
5
Item Types
AWS::RDS::DBSnapshot