This rule focuses on restricting ingress SSH access from 0.0.0.0/0 in VPC security groups.
Rule | VPC security groups should restrict ingress SSH access from 0.0.0.0/0 |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description:
According to NIST 800-171 Revision 2 compliance requirements, the security groups within the Virtual Private Cloud (VPC) should have strict restrictions in place for incoming SSH (Secure Shell) access. This rule specifically focuses on restricting SSH access from any IP address (0.0.0.0/0) to enhance the overall security posture of the VPC.
Troubleshooting Steps:
Required Codes:
No specific code is required for this rule. However, modifications to the existing security group rules are necessary.
Remediation Steps:
Step 1: Accessing AWS Management Console
Step 2: Locating the Security Group
Step 3: Modifying Inbound Rules
Step 4: Removing 0.0.0.0/0 SSH Ingress Access
Step 5: Modifying SSH Rule
Step 6: Applying the Changes
Step 7: Validation
Summary:
By ensuring that the VPC security group restricts ingress SSH access from 0.0.0.0/0 according to the NIST 800-171 Revision 2 requirements, the risk of unauthorized SSH access is mitigated. Following the step-by-step guide and modifying the inbound rules accordingly will enhance the security posture of the VPC to maintain compliance with NIST standards.