Control: RDS snapshots should prohibit public access
Manage access to resources in the AWS Cloud by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public.
Run the control in your terminal:
steampipe check aws_compliance.control.rds_db_snapshot_prohibit_public_access
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share aws_compliance.control.rds_db_snapshot_prohibit_public_access
This control uses a named query:rds_db_snapshot_prohibit_public_access