turbot/aws_perimeter
GitHub
Loading controls...

Control: Database Migration Service (DMS) replication instances should not be public

Description

This control checks whether AWS DMS replication instances are public. A private replication instance has a private IP address that you cannot access outside of the replication network. A replication instance should have a private IP address when the source and target databases are in the same network, and the network is connected to the replication instance's VPC using a VPN, AWS Direct Connect, or VPC peering.

Usage

Run the control in your terminal:

steampipe check aws_perimeter.control.dms_replication_instance_not_publicly_accessible

Snapshot and share results via Steampipe Cloud:

steampipe login
steampipe check --share aws_perimeter.control.dms_replication_instance_not_publicly_accessible

Plugins & Tables

SQL

select
arn as resource,
case
when publicly_accessible then 'alarm'
else 'ok'
end status,
case
when publicly_accessible then title || ' publicly accessible.'
else title || ' not publicly accessible.'
end reason,
region,
account_id
from
aws_dms_replication_instance;

Tags