Check if RDS Snapshots and Cluster Snapshots are public.
Risk
Publicly accessible services could expose sensitive data to bad actors. t is recommended that your RDS snapshots should not be public in order to prevent potential leak or misuse of sensitive data or any other kind of security threat. If your RDS snapshot is public, then the data which is backed up in that snapshot is accessible to all other AWS accounts.
Run this check with Prowler CLI
prowler aws --checks rds_snapshots_public_access
Fix finding with Prowler CLIfixer
prowler aws --checks rds_snapshots_public_access --fixer
ARN template
arn:aws:rds:region:account-id:snapshot
Remediation
aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot_id> --attribute-name restore --values-to-remove all
https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/RDS/public-snapshots.html
Use AWS Config to identify any snapshot that is public.
Source Code
References
Resource Type
AwsRdsDbSnapshot