Checks if primary nodes in Amazon EMR clusters are assigned public IP addresses, which could expose them to potential external threats.
Rule | Amazon EMR cluster primary nodes should not have public IP addresses |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ High |
Rule Description
Amazon EMR cluster primary nodes should not have public IP addresses to adhere to AWS Foundational Security Best Practices. Public IP addresses can expose the primary nodes to external threats and unauthorized access.
Troubleshooting
If the primary nodes of your EMR cluster have public IP addresses, you need to disable them to enhance security.
Remediation Steps
Identify the EMR Cluster:
Update the Cluster Configuration:
Update Security Group:
Verify Changes:
Example CLI Command
To update the EMR cluster configuration using the AWS Command Line Interface (CLI), you can use the following command:
aws emr modify-cluster --cluster-id your-cluster-id --ec2-attributes AdditionalMasterSecurityGroups=your-security-group-id,AdditionalSlaveSecurityGroups=your-security-group-id
Ensure you replace
your-cluster-id
and your-security-group-id
with the actual values for your cluster and security group.By following these steps, you can ensure that the primary nodes of your Amazon EMR cluster do not have public IP addresses, aligning with AWS Foundational Security Best Practices.