Help Center/
Relational Database Service/
User Guide (ME-Abu Dhabi Region) /
FAQs/
Network Security/
How Can I Prevent Untrusted Source IP Addresses from Accessing RDS?
Updated on 2023-07-06 GMT+08:00
How Can I Prevent Untrusted Source IP Addresses from Accessing RDS?
- After you enable public accessibility, your EIP DNS and database port may be obtained by malicious personnel. To protect your information including your EIP, DNS, database port, database account, and password, you are advised to set the range of source IP addresses in the RDS security group to ensure that only trusted source IP addresses can access your DB instances.
- To prevent your database password from being maliciously cracked, set a strong password according to the password strength policies and periodically change it.
- RDS for SQL Server supports defense against brute force cracking. If malicious individuals have obtained your EIP DNS, database port, or database login information and try to crack your database with brute force, your service connections may be delayed. In this case, you can restrict the source connections and change the database username and password to prevent further damage.
RDS for MySQL and PostgreSQL do not support defense against brute force cracking.
For RDS for Microsoft SQL Server, defense against brute force cracking is enabled by default and cannot be disabled.
Parent topic: Network Security
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot