Amazon Redshift clusters should prohibit public access
Identifier
redshift-disable-public-access
Category
Protect > Secure network configuration > Resources not publicly accessible
Description
This control checks whether Amazon Redshift clusters are not publicly accessible. Disabling public access helps ensure that your data warehouse is only accessible from within a secure and trusted network, thereby reducing the risk of unauthorized access and data breaches.
In Terraform, this is controlled by setting publicly_accessible = false in the aws_redshift_cluster resource. When publicly_accessible is set to true, the cluster receives a public IP address and can be accessed from outside the VPC, which is not recommended unless explicitly required and tightly controlled.
Non Compliant Example
| Terraform | |
|---|---|
Remediation
To fix this violation, set publicly_accessible = false:
| Terraform | |
|---|---|