Steampipe MCP Server →
Steampipe Hub 
Hub
  • Plugins
  • Mods
  • Docs
  • Home
PluginsModsDocsHome
Plugins
turbot/aws
GitHub Repo Stars
Overview
547
Tables
2,714
Queries
PowerpipeModsGitHub
steampipe plugin install awssteampipe plugin install aws
Loading...
Get Involved
Edit on GitHubDiscuss on Slack

Query: RDS DB instances should prohibit public access

Description

Manage access to resources in the AWS Cloud by ensuring that AWS Relational Database Service (AWS RDS) instances are not public.

Query

Tables used in this query:

  • aws_rds_db_instance

Controls using this query:

  • 2 RDS DB instances should prohibit public access, determined by the PubliclyAccessible configuration
  • 2.2.3 Ensure that RDS instances are not publicly accessible
  • 2.2.3 Ensure that RDS instances are not publicly accessible
  • 2.3.3 Ensure that public access is not given to RDS Instance
  • 2.3.3 Ensure that public access is not given to RDS Instance
  • 2.3.3 Ensure that public access is not given to RDS Instance
  • RDS DB instances should prohibit public access

SQL

Steampipe
Steampipe
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of 3,000+ practitioners love to discuss Steampipe, cloud intelligence & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy