Database Migration Service replication instances should not be public
Identifier
dms-disable-public-access
Category
Protect > Secure network configuration
Description
This control checks whether AWS Database Migration Service (DMS) replication instances are not publicly accessible. Disabling public access helps reduce exposure to the internet and lowers the risk of unauthorized access or data breaches.
DMS replication instances should reside in private subnets with controlled access via security groups and VPC configurations. In Terraform, this is enforced by setting publicly_accessible = false in the aws_dms_replication_instance resource.
Non Compliant Example
| Terraform | |
|---|---|
Remediation
To fix this violation, set publicly_accessible = false:
| Terraform | |
|---|---|