Control: RDS DB instances should prohibit public access
Manage access to resources in the AWS Cloud by ensuring that Amazon Relational Database Service (Amazon RDS) instances are not public.
Run the control in your terminal:
steampipe check terraform_aws_compliance.control.rds_db_instance_prohibit_public_access
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share terraform_aws_compliance.control.rds_db_instance_prohibit_public_access
This control uses a named query:rds_db_instance_prohibit_public_access