Control: RDS DB instances should not use public subnet
Description
This control checks if RDS DB instance is configured with public subnet as there is a risk of exposing sensitive data.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.rds_db_instance_no_public_subnet
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.rds_db_instance_no_public_subnet --share
SQL
This control uses a named query:
rds_db_instance_no_public_subnet