Neptune cluster with IAM database authentication disabled
Ce produit n'est pas pris en charge par le
site Datadog que vous avez sélectionné. (
).
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Id: c91d7ea0-d4d1-403b-8fe1-c9961ac082c5
Cloud Provider: AWS
Platform: Terraform
Severity: High
Category: Access Control
Learn More
Description
AWS Neptune clusters should have IAM database authentication enabled to enhance security by using IAM users and roles instead of standard username and password credentials. When disabled, an attacker who gains access to the database credentials could directly connect to the database without additional IAM verification. To secure your Neptune cluster, add the iam_database_authentication_enabled = true parameter, as shown in the following example:
resource "aws_neptune_cluster" "example" {
cluster_identifier = "neptune-cluster-demo"
// other configuration...
iam_database_authentication_enabled = true
}
Compliant Code Examples
resource "aws_neptune_cluster" "negative1" {
cluster_identifier = "neptune-cluster-demo"
engine = "neptune"
backup_retention_period = 5
preferred_backup_window = "07:00-09:00"
skip_final_snapshot = true
iam_database_authentication_enabled = true
apply_immediately = true
storage_encrypted = true
}
Non-Compliant Code Examples
resource "aws_neptune_cluster" "positive1" {
cluster_identifier = "neptune-cluster-demo"
engine = "neptune"
backup_retention_period = 5
preferred_backup_window = "07:00-09:00"
skip_final_snapshot = true
apply_immediately = true
storage_encrypted = true
}
resource "aws_neptune_cluster" "positive2" {
cluster_identifier = "neptune-cluster-demo"
engine = "neptune"
backup_retention_period = 5
preferred_backup_window = "07:00-09:00"
skip_final_snapshot = true
iam_database_authentication_enabled = false
apply_immediately = true
storage_encrypted = true
}