This rule focuses on restricting ingress access on common ports within VPC security groups.
Rule | VPC security groups should restrict ingress access on ports 20, 21, 22, 3306, 3389, 4333 from 0.0.0.0/0 |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
This rule aims to enforce secure access to the resources within a VPC by restricting ingress traffic on specific ports from the 0.0.0.0/0 (any IP address) source for compliance with NIST 800-53 Revision 5 security standards.
Troubleshooting Steps:
Remediation Steps:
CLI Command:
aws ec2 describe-security-groups --group-names <security_group_name>
CLI Command:
aws ec2 authorize-security-group-ingress --group-id <security_group_id> --protocol tcp --port 20 --cidr 0.0.0.0/0 --source-security-group <source_security_group_id>
Replace
<security_group_id>
with the target security group ID that needs modification.Repeat step 5 for ports 21, 22, 3306, 3389, and 4333.
Update any documentation or configurations that reference allowing inbound traffic on these ports from 0.0.0.0/0.
Note:
Ensure that only trusted and necessary IP addresses or ranges are allowed access to these ports for increased security and compliance with NIST 800-53 Revision 5.