This rule ensures that EBS snapshots are not publicly restorable for security reasons.
Rule | EBS snapshots should not be publicly restorable |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Medium |
Rule: EBS Snapshots Should Not Be Publicly Restorable for FedRAMP Low Revision 4
Description
FedRAMP (Federal Risk and Authorization Management Program) Low Impact Level requirements stipulate that security controls are in place for federal information systems. For Amazon Web Services (AWS) Elastic Block Store (EBS) snapshots, making them publicly available can pose a security threat as unauthorized users could potentially access sensitive data.
Under this rule, organizations are required to ensure that EBS snapshots are not publicly restorable. Snapshots should only be shared with authorized accounts or kept private to prevent data breaches.
Troubleshooting Steps
If a snapshot is found to be publicly accessible, follow these steps to remedy the situation:
Step 1: Identify Public Snapshots
To find publicly available snapshots using the AWS Management Console:
Elastic Block Store
, click Snapshots
.Public Snapshots
.Step 2: Change Snapshot Permissions
To modify the permissions of a public snapshot:
Actions
then Modify Permissions
.Private
and remove any public access.Save
.Step 3: Automate Remediation with AWS CLI
The following CLI command can be used to change the permissions of a snapshot to private:
aws ec2 modify-snapshot-attribute \ --snapshot-id snap-1234567890abcdef0 \ --attribute createVolumePermission \ --operation-type remove \ --group-names all \ --region <your-region>
Replace
snap-1234567890abcdef0
with your snapshot ID and <your-region>
with the appropriate AWS region.Remediation Guide
Review Account IAM Policies: Audit your IAM policies to ensure least privilege access is being adhered to. Users should not have permissions to make snapshots public unless absolutely necessary.
Snapshot Lifecycle Policies: Implement lifecycle policies that define the creation, retention, and deletion of snapshots to manage them effectively.
Regular Audits:
Enable CloudTrail Logging:
ModifySnapshotAttribute
. This will help in tracking changes made to snapshots.Educate Users: Conduct training sessions for all users handling AWS services to make them aware of the security implications tied to EBS snapshots.
Implement Monitoring and Alerts:
By following these steps and ensuring continuous monitoring and education, organizations can maintain compliance with FedRAMP Low Revision 4's requirement regarding EBS snapshots. Remember to regularly review these practices as both technology and compliance regulations evolve.