AWS Config Rule: RDS Cluster IAM Authentication Enabled

RDS_CLUSTER_IAM_AUTHENTICATION_ENABLED

Eduardo Van Cauteren

Last Update 9 เดือนที่แล้ว

Description: Checks if an Amazon RDS Cluster has AWS Identity and Access Management (IAM) authentication enabled. The rule is NON_COMPLIANT if an RDS Cluster does not have IAM authentication enabled.


Trigger type: Configuration changes


AWS Region: All supported AWS regions except Middle East (Bahrain), China (Beijing), Asia Pacific (Jakarta), Middle East (UAE), South America (Sao Paulo), Asia Pacific (Hyderabad), Asia Pacific (Osaka), AWS GovCloud (US-East), AWS GovCloud (US-West), Europe (Spain), China (Ningxia), Europe (Zurich) Region


How to Resolve Manually

This rules checks whether Identity and Access Management (IAM) authentication is enabled for a specific Amazon RDS database cluster. If the database authentication is configured as password authentication, the rule will be marked as non-compliant. Notice that the IAM Authentication option is only is available for clusters of the RDS Aurora type.


To resolve this, you need to check the current database authentication of an instance. Head to AWS Console, go to RDS service and click on DB Clusters from within the Dashboard. Then click on the name of the desired cluster, go to the Configuration tab to check the current IAM DB authentication status. In case it's Disabled, click on Modify button to open the configuration screen then look for the Database authentication card and choose the Password and IAM database authentication option; click Continue to review the Summary of modifications then finally click on Modify DB Cluster button to apply changes. Check the following screenshot as reference:


Want to know more about StackZone and how to make your cloud management simple and secure?

Check our how it works section with easy to follow videos or just create your own StackZone Account here

Was this article helpful?

0 out of 0 liked this article

Still need help? Message Us