Control: Database Migration Service (DMS) replication instances should not be public
This control checks whether AWS DMS replication instances are public. A private replication instance has a private IP address that you cannot access outside of the replication network. A replication instance should have a private IP address when the source and target databases are in the same network, and the network is connected to the replication instance's VPC using a VPN, AWS Direct Connect, or VPC peering.
Run the control in your terminal:
steampipe check aws_perimeter.control.dms_replication_instance_not_publicly_accessible
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share aws_perimeter.control.dms_replication_instance_not_publicly_accessible
Plugins & Tables
select arn as resource, case when publicly_accessible then 'alarm' else 'ok' end status, case when publicly_accessible then title || ' publicly accessible.' else title || ' not publicly accessible.' end reason, region, account_idfrom aws_dms_replication_instance;