Medium RDS Regional

RDS for SQL Server DB instances should be encrypted in transit

FSBP

Description

Checks if Amazon RDS for SQL Server DB instances are configured to use encryption in transit. The control fails if the SQL Server DB instance is not configured to require SSL/TLS encryption for connections by setting the require_ssl parameter to 1.


Remediation

To enable encryption in transit for SQL Server DB instances, follow these steps:

Steps

  1. Sign in to the AWS Management Console and open the Amazon RDS console.
  2. In the navigation pane, choose 'Databases'.
  3. Select the identified SQL Server DB instance that requires encryption in transit.
  4. Choose 'Modify'.
  5. In the 'Database Options' section, locate the 'DB parameter group' setting.
  6. If using a custom parameter group, modify the 'require_ssl' parameter to '1'.
  7. If using the default parameter group, create a new custom parameter group and set 'require_ssl' to '1'.
  8. Apply the parameter group to your DB instance.
  9. Scroll to the bottom of the page and choose 'Continue'.
  10. On the summary page, review your changes. Select 'Apply immediately' to enable encryption right away, or choose to apply them during the next maintenance window.
  11. Click 'Modify DB Instance' to apply the changes.
  12. For detailed guidance, refer to the AWS documentation: 'Using SSL/TLS to encrypt a connection to a DB instance' in the Amazon RDS User Guide.

Compliance

FSBP