Publicly Accessible DMS Replication Instances
ID: dms-public-access
Severity: medium
Author: DhiyaneshDK
Tags: cloud,devops,aws,amazon,dms,aws-cloud-config
Description
Section titled “Description”Ensure that your Amazon Database Migration Service (DMS) are not publicly accessible from the Internet in order to avoid exposing private data and minimize security risks.
YAML Source
Section titled “YAML Source”id: dms-public-access
info: name: Publicly Accessible DMS Replication Instances author: DhiyaneshDK severity: medium description: | Ensure that your Amazon Database Migration Service (DMS) are not publicly accessible from the Internet in order to avoid exposing private data and minimize security risks. impact: | Publicly accessible DMS replication instances expose your database to unauthorized access and potential attacks, increasing the risk of data breaches and compromising the security of sensitive information. remediation: | Restrict access to your DMS replication instances by configuring security groups and network access controls to allow connections only from trusted IP addresses and private subnets, ensuring that they are not publicly accessible. reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/DMS/publicly-accessible.html - https://docs.aws.amazon.com/dms/latest/userguide/CHAP_ReplicationInstance.html tags: cloud,devops,aws,amazon,dms,aws-cloud-config
variables: region: "us-west-2"
flow: | code(1) for(let ReplicationInstances of iterate(template.replications)){ set("replication", ReplicationInstances) code(2) }
self-contained: true
code: - engine: - sh - bash source: | aws dms describe-replication-instances --region $region --query "ReplicationInstances[*].ReplicationInstanceArn" --output json
extractors: - type: json name: replications internal: true json: - '.[]'
- engine: - sh - bash source: | aws dms describe-replication-instances --region $region --filters Name=replication-instance-arn,Values=$replication --query "ReplicationInstances[*].PubliclyAccessible" --output json
matchers: - type: word words: - "true"
extractors: - type: dsl dsl: - '"DMS Replication Instances " + replication + " Publicly Accessible"'# digest: 490a00463044022000b131dbeae740f870eaff7231c7c569dd834c331f38ca46b0991820e3120d95022051094b7224aff719e7e8172873e5598d67fed8b026e4d82ee6370a9921f37230:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "cloud/aws/dms/dms-public-access.yaml"