This rule ensures VPC internet gateways are properly attached to authorized VPC for security compliance.
Rule | VPC internet gateways should be attached to authorized vpc |
Framework | NIST 800-53 Revision 4 |
Severity | ✔ Medium |
Rule Description:
According to the NIST 800-53 Revision 4 security standard, VPC (Virtual Private Cloud) internet gateways should only be attached to authorized VPCs. This rule ensures that network traffic remains secure and isolated within the designated VPCs, preventing unauthorized access to resources and potential security breaches.
Troubleshooting Steps:
If an internet gateway is found attached to an unauthorized VPC, the following troubleshooting steps can be taken:
Necessary Codes:
There are no specific codes required for this rule. However, the AWS Command Line Interface (CLI) can be used to verify and modify the internet gateway attachments if needed.
Remediation Steps:
To remediate the issue of an unauthorized VPC attachment to a VPC internet gateway, follow these steps:
Replaceaws ec2 detach-internet-gateway --internet-gateway-id [internet-gateway-id] --vpc-id [vpc-id]
[internet-gateway-id]
with the actual ID of the internet gateway and [vpc-id]
with the ID of the unauthorized VPC.Verify that the unauthorized VPC is no longer listed as an attachment.aws ec2 describe-internet-gateways --internet-gateway-ids [internet-gateway-id]
Ensure that the authorized VPC is correctly attached to the internet gateway.aws ec2 describe-internet-gateways --internet-gateway-ids [internet-gateway-id]
Following these steps will remediate the issue, ensuring that only authorized VPCs are attached to the internet gateways in accordance with the NIST 800-53 Revision 4 standard.