Control: Database Migration Service (DMS) replication instances should not be public
Description
This control checks whether AWS DMS replication instances are public. A private replication instance has a private IP address that you cannot access outside of the replication network. A replication instance should have a private IP address when the source and target databases are in the same network, and the network is connected to the replication instance's VPC using a VPN, AWS Direct Connect, or VPC peering.
Usage
Run the control in your terminal:
powerpipe control run aws_perimeter.control.dms_replication_instance_not_publicly_accessible
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_perimeter.control.dms_replication_instance_not_publicly_accessible --share
Steampipe Tables
SQL
select arn as resource, case when publicly_accessible then 'alarm' else 'ok' end status, case when publicly_accessible then title || ' publicly accessible.' else title || ' not publicly accessible.' end reason, region, account_idfrom aws_dms_replication_instance;