This rule ensures that VPC security groups restrict TCP and UDP access from 0.0.0.0/0 for enhanced security.
Rule | VPC security groups should restrict ingress TCP and UDP access from 0.0.0.0/0 |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ High |
Rule Description:
According to the FedRAMP Moderate Revision 4 guidelines, VPC security groups should restrict ingress TCP and UDP access from the IP range 0.0.0.0/0. This ensures that all incoming traffic to the VPC is limited to specific ports and protocols and helps to enhance the overall security posture of the VPC.
Troubleshooting Steps (if any):
If the VPC security group is not correctly configured to restrict ingress TCP and UDP access from 0.0.0.0/0, you may encounter connectivity issues or unauthorized access attempts. To troubleshoot this, follow the steps below:
Necessary Codes (if any):
To implement the necessary rule, you can use the AWS Command Line Interface (CLI) or the AWS Management Console.
AWS CLI Command:
aws ec2 authorize-security-group-ingress --group-id <security-group-id> --protocol tcp --port <port-range> --cidr 0.0.0.0/0 aws ec2 authorize-security-group-ingress --group-id <security-group-id> --protocol udp --port <port-range> --cidr 0.0.0.0/0
Replace
<security-group-id>
with the actual ID of the VPC security group and <port-range>
with the required port range.Step-by-Step Guide for Remediation:
To ensure that VPC security groups restrict ingress TCP and UDP access from 0.0.0.0/0 according to the FedRAMP Moderate Revision 4 guidelines, follow the step-by-step guide below:
By following the above steps, you have successfully configured the VPC security group to restrict ingress TCP and UDP access from 0.0.0.0/0, aligning with the FedRAMP Moderate Revision 4 requirements.