Control: Database Migration Service (DMS) replication instances should not be public
Description
This control checks whether AWS DMS replication instances are public. A private replication instance has a private IP address that you cannot access outside of the replication network. A replication instance should have a private IP address when the source and target databases are in the same network, and the network is connected to the replication instance's VPC using a VPN, AWS Direct Connect, or VPC peering.
Usage
Run the control in your terminal:
powerpipe control run aws_perimeter.control.dms_replication_instance_not_publicly_accessibleSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_perimeter.control.dms_replication_instance_not_publicly_accessible --shareSteampipe Tables
SQL
select  arn as resource,  case    when publicly_accessible then 'alarm'    else 'ok'  end status,  case    when publicly_accessible then title || ' publicly accessible.'    else title || ' not publicly accessible.'  end reason    , region, account_idfrom  aws_dms_replication_instance;