LS-05: Direct Database Access Restrictions
Restrict direct access to in-scope databases based on job function
Control Description
Direct access to the in-scope databases is restricted to appropriate users based on job function.
Plain Meaning
This control requires that only users who need direct database access for their job responsibilities can access the databases. This prevents unauthorized access and ensures that database access is limited to those who actually need it to perform their work.

Database Hosting Strategy
Our production databases are hosted in private subnets within our AWS VPC architecture, ensuring maximum security and access control. This approach provides multiple layers of protection against unauthorized access.
Network Isolation
- Private Subnets: All production databases are deployed in private subnets (10.0.1.0/24, 10.0.2.0/24, 10.0.3.0/24)
- No Public Access: Database instances are configured with no public IP addresses
- Private Subnet Placement: Databases are placed in private subnets with no direct internet connectivity
- Security Group Restrictions: Strict security groups limit access to only authorized resources
VPC Architecture Integration
Our database infrastructure integrates with the VPC architecture detailed in COM-06, utilizing:
- Private Subnets: Dedicated subnets for database instances
- NAT Gateway: Outbound-only internet access for security updates
- No Internet Gateway: Complete isolation from direct internet access
- Route Table Isolation: Separate route tables for database subnets
Access Control Implementation
Single Person Access Policy
We implement a single person access policy for direct database access, ensuring that only one authorized individual has the ability to connect directly to production databases.
Database Security Configuration
RDS Security Settings
- Publicly Accessible: Disabled
- VPC Security Groups: Restrictive access rules
- Subnet Group: Isolated subnet placement
- Encryption: Enabled for all database instances
- Backup Encryption: All backups encrypted with KMS keys
Network Security
- No Public IP: Database instances have no public IP addresses
- Private DNS: Internal DNS resolution only
- VPN Access: Database access requires VPC connection
- Bastion Host: Secure jump host for database access when needed
Access Activity Monitoring

Related Controls
- LS-04: External user account management
- LS-14: Administrative access restrictions
- LS-22: Manager approval for access requests