Check provider logo

NeptuneDB cluster snapshot is not publicly shared

neptune_cluster_public_snapshot

Severitycritical
Serviceneptune
by Prowler

Neptune DB manual cluster snapshot is evaluated to determine if its restore attributes allow access to all AWS accounts (public).

A failed status in the report means the snapshot is publicly shared and can be copied or restored by any AWS account; PASS means it is not shared publicly.

Risk

Public snapshots compromise confidentiality of stored data and metadata.

Attackers or third parties can:

  • Copy or restore snapshots to external accounts.
  • Access sensitive data contained in the snapshot.
Run this check with Prowler CLI

prowler aws --checks neptune_cluster_public_snapshot

Fix finding with Prowler CLI

prowler aws --checks neptune_cluster_public_snapshot --fixer

Recommendation

Avoid public sharing and apply least privilege when granting snapshot access: share only with specific AWS accounts or roles.

Use encryption, enforce automated policies and regular audits, and apply separation of duties and tagging to control and track snapshot access.

Remediation

CLI

aws neptune modify-db-cluster-snapshot-attribute --db-cluster-snapshot-identifier <snapshot_id> --attribute-name restore --values-to-remove all

Other
  1. Sign in to the AWS Management Console and open the Amazon RDS console
  2. In the left navigation, choose Snapshots > DB cluster snapshots
  3. Select the snapshot, choose Actions > Manage snapshot permissions
  4. In the permissions dialog remove the Public/all-accounts permission and click Save

Source Code

Resource Type

AwsRdsDbClusterSnapshot

References