Neptune cluster with IAM database authentication disabled
This product is not supported for your selected
Datadog site. (
).
Id: c91d7ea0-d4d1-403b-8fe1-c9961ac082c5
Cloud Provider: aws
Framework: Terraform
Severity: High
Category: Access Control
Learn More
Description
AWS Neptune clusters should have IAM database authentication enabled to enhance security by using IAM users and roles instead of standard username and password credentials. When disabled, an attacker who gains access to the database credentials could directly connect to the database without additional IAM verification. To secure your Neptune cluster, add the iam_database_authentication_enabled = true
parameter, as shown in the following example:
resource "aws_neptune_cluster" "example" {
cluster_identifier = "neptune-cluster-demo"
// other configuration...
iam_database_authentication_enabled = true
}
Compliant Code Examples
resource "aws_neptune_cluster" "negative1" {
cluster_identifier = "neptune-cluster-demo"
engine = "neptune"
backup_retention_period = 5
preferred_backup_window = "07:00-09:00"
skip_final_snapshot = true
iam_database_authentication_enabled = true
apply_immediately = true
storage_encrypted = true
}
Non-Compliant Code Examples
resource "aws_neptune_cluster" "positive1" {
cluster_identifier = "neptune-cluster-demo"
engine = "neptune"
backup_retention_period = 5
preferred_backup_window = "07:00-09:00"
skip_final_snapshot = true
apply_immediately = true
storage_encrypted = true
}
resource "aws_neptune_cluster" "positive2" {
cluster_identifier = "neptune-cluster-demo"
engine = "neptune"
backup_retention_period = 5
preferred_backup_window = "07:00-09:00"
skip_final_snapshot = true
iam_database_authentication_enabled = false
apply_immediately = true
storage_encrypted = true
}