Checks whether an ApsaraDB RDS instance has a public endpoint in use.
Scenarios
If clients cannot access an ApsaraDB RDS instance over a VPC, you can apply for a
public endpoint for the ApsaraDB RDS instance. A public endpoint affects data security
of the instance. We recommend that you apply for a public endpoint with caution. You
may need to apply for a public endpoint in the following scenarios:
- You need to access an ApsaraDB RDS instance from an Elastic Compute Service (ECS) instance that resides in a different region or has a different network type.
- You need to access an ApsaraDB RDS instance from a device outside Alibaba Cloud.
Risk level
Default risk level: high.
You can change the risk level as required when you apply this rule.
Compliance evaluation logic
- If the ApsaraDB RDS instance does not have a public endpoint in use, the configuration is considered compliant.
- If the ApsaraDB RDS instance has a public endpoint in use, the configuration is considered non-compliant. For more information about how to correct the non-compliant configuration, see Non-compliance remediation.
Rule details
Item | Description |
---|---|
Rule name | rds-public-access-check |
Rule ID | rds-public-access-check |
Tag | RDS |
Automatic remediation | Not supported |
Trigger type | Configuration change |
Supported resource type | ApsaraDB RDS instance |
Input parameter | None |
Non-compliance remediation
Release the public endpoint of the ApsaraDB RDS instance. For more information, see Apply for or release a public endpoint for an ApsaraDB RDS for MySQL instance.