Ensure VPC network access control lists are associated with a subnet for better security.
Rule | VPC network access control lists (network ACLs) should be associated with a subnet. |
Framework | CISA-cyber-essentials |
Severity | ✔ Low |
VPC Network Access Control Lists (Network ACLs) for CISA Cyber Essentials
Rule Description
Network access control lists (Network ACLs) in a Virtual Private Cloud (VPC) ensure the security and control of inbound and outbound traffic to a subnet. It is a critical security measure that enforces network traffic rules at the subnet level. As per CISA Cyber Essentials, every subnet within a VPC should have an associated Network ACL to tightly manage and control network traffic.
Troubleshooting Steps
If a subnet does not have an associated Network ACL, it can pose a security risk and may lead to unauthorized network access. To troubleshoot this issue, follow these steps:
Determine if the subnet has an associated Network ACL: Login to the AWS Management Console and navigate to the VPC service. Select the desired VPC and check if each subnet has a Network ACL associated with it.
Identify the missing Network ACL: If a subnet does not have an associated Network ACL, note down the subnet identifier for further troubleshooting.
Verify if the Network ACL exists: Navigate to the Network ACL section in the VPC service. Check if the missing Network ACL exists in the list. If it does not exist, it needs to be created.
Necessary Codes
If the subnet is missing an associated Network ACL, follow these steps to associate it:
aws ec2 replace-network-acl-association --association-id <existing_association_id> --network-acl-id <new_network_acl_id>
Replace the
<existing_association_id>
with the ID of the existing association that needs to be replaced. Replace <new_network_acl_id>
with the ID of the new Network ACL.Step-by-Step Guide for Remediation
To associate a Network ACL with a subnet, follow these steps:
Step 1: Login to the AWS Management Console and navigate to the VPC service.
Step 2: Select the desired VPC where the subnet is located.
Step 3: Locate the subnet without an associated Network ACL.
Step 4: Write down the subnet identifier for reference.
Step 5: In the left sidebar, click on "Network ACLs" under the "Security" section.
Step 6: Check if the missing Network ACL already exists in the list. If it does not exist, proceed to Step 7.
Step 7: Click on "Create network ACL".
Step 8: Choose a VPC and provide a name for the Network ACL. Click on "Create".
Step 9: Once the Network ACL is created, click on its ID.
Step 10: In the "Inbound rules" and "Outbound rules" tabs, configure the desired traffic rules as per your security requirements. Click on "Save".
Step 11: Go back to the subnet without an associated Network ACL.
Step 12: In the subnet details, click on "Modify network ACL associations".
Step 13: Click on "Add association" and select the newly created Network ACL. Click on "Save".
Step 14: Verify that the subnet now has an associated Network ACL by checking the subnet details.
By following these steps, you can ensure that all subnets within your VPC have their respective associated Network ACLs as per the recommendations of CISA Cyber Essentials.