This rule states that Amazon EBS snapshots should not be publicly restorable for PCI Compliance in EC2 environment.
Rule | Amazon EBS snapshots should not be publicly restorable |
Framework | PCI v3.2.1 |
Severity | ✔ Critical |
Rule Description
To comply with PCI v3 requirements, Amazon EBS snapshots should not be publicly restorable. This means that only authorized users and accounts should have the ability to restore EBS snapshots.
Reason for the Rule
The rule is implemented to ensure the security and confidentiality of sensitive data stored in Amazon EBS snapshots. Publicly restorable snapshots pose a significant risk as they can be easily accessed and restored by unauthorized individuals or entities.
Troubleshooting Steps
If EBS snapshots are found to be publicly restorable, follow the troubleshooting steps below to address the issue:
Identify the publicly restorable snapshots:
Determine the affected snapshots:
Ensure secure access to EBS snapshots:
Update snapshot permissions:
Necessary Codes
The following AWS CLI command can be used to modify the permissions of an EBS snapshot:
aws ec2 modify-snapshot-attribute --snapshot-id <snapshot-id> --attribute createVolumePermission --group-names <group-name> --operation-type add
<snapshot-id>
with the ID of the EBS snapshot that needs to be modified.<group-name>
with the appropriate group name or AWS account ID to grant access.Step-by-Step Guide for Remediation
Follow the step-by-step guide below to remediate the issue of publicly restorable Amazon EBS snapshots:
Log in to your AWS Management Console.
Navigate to the EC2 Dashboard.
Choose "Snapshots" from the left-hand menu.
Identify the snapshots that are publicly restorable:
Update the snapshot permissions:
Modify the permissions for the snapshot(s):
Verify the changes:
Repeat the process for any other publicly restorable EBS snapshots identified in step 4.
By following these steps, you can ensure that your Amazon EBS snapshots are not publicly restorable, thereby complying with PCI v3 requirements.