Ensure EBS snapshots are not publicly restorable to maintain data security.
Rule | EBS snapshots should not be publicly restorable |
Framework | NIST 800-53 Revision 4 |
Severity | ✔ Medium |
EBS Snapshots Public Restorability Policy
Description
According to the NIST 800-53 Revision 4 security guideline, it is essential to ensure that Elastic Block Store (EBS) snapshots are not publicly restorable. By configuring this policy, you prevent unauthorized access to sensitive or confidential data stored in snapshots.
Troubleshooting Steps
If there are any issues with this policy, consider the following troubleshooting steps:
Necessary Codes
There are no specific codes related to this policy. However, AWS provides API commands to manage EBS snapshots, which can be used to enforce this policy.
Remediation Steps
To enforce the policy of not allowing public restorability for EBS snapshots, follow these step-by-step remediation instructions:
Identify publicly restorable snapshots:
aws ec2 describe-snapshots
Revoke public restorability:
aws ec2 modify-snapshot-attribute --snapshot-id <snapshot-id> --attribute createVolumePermission --operation-type remove --user-ids all
Verify the change:
aws ec2 describe-snapshot-attribute --snapshot-id <snapshot-id> --attribute createVolumePermission
Periodic auditing:
Conclusion
By following the above procedure, you will successfully enforce the policy of disallowing public restorability for EBS snapshots, adhering to the NIST 800-53 Revision 4 security guideline. Regular monitoring and auditing of snapshot permissions will help maintain the integrity and security of your data.