This rule ensures VPC security groups restrict ingress access on specific common ports to enhance security.
Rule | VPC security groups should restrict ingress access on ports 20, 21, 22, 3306, 3389, 4333 from 0.0.0.0/0 |
Framework | CISA-cyber-essentials |
Severity | ✔ High |
Rule Description: Restricting Ingress Access on Specific Ports for VPC Security Groups
Rule Overview:
This rule enforces the restriction of ingress access on specific ports within a Virtual Private Cloud (VPC) security group. The rule mandates the limitation of access on ports 20, 21, 22, 3306, 3389, and 4333 from the IP range 0.0.0.0/0. This restriction aims to enhance the security posture of the VPC by reducing exposure to potential threats.
Rule Details:
To implement this rule, the following steps need to be followed:
Troubleshooting Steps:
If there are any issues encountered during the implementation of this rule, the following troubleshooting steps can be helpful:
Necessary Codes:
No specific code snippets are required for this rule. The implementation can be done through the AWS Management Console or via CLI commands.
Step-by-Step Guide for Remediation:
To implement the required ingress access restriction on the specified ports within VPC security groups, follow these step-by-step instructions:
By following these steps, the ingress access on ports 20, 21, 22, 3306, 3389, and 4333 from the IP range 0.0.0.0/0 will be effectively restricted within the specified VPC security group(s).