

# rds-instance-subnet-igw-check
<a name="rds-instance-subnet-igw-check"></a>

Checks if RDS DB instances are deployed in a public subnet with a route to the internet gateway. The rule is NON\_COMPLIANT if RDS DB instances is deployed in a public subnet 



**Identifier:** RDS\_INSTANCE\_SUBNET\_IGW\_CHECK

**Resource Types:** AWS::RDS::DBInstance

**Trigger type:** Periodic

**Amazon Web Services Region:** All supported Amazon regions except Asia Pacific (New Zealand), Asia Pacific (Thailand), Asia Pacific (Malaysia), Mexico (Central), Asia Pacific (Taipei) Region

**Parameters:**

None  

## Amazon CloudFormation template
<a name="w2aac20c16c17b7e1247c19"></a>

To create Amazon Config managed rules with Amazon CloudFormation templates, see [Creating Amazon Config Managed Rules With Amazon CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).