Verifies that the default stateless action for fragmented packets in Network Firewall policies is set to drop or forward, preventing unauthorized traffic flow.
Rule | The default stateless action for Network Firewall policies should be drop or forward for fragmented packets |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ Medium |
Rule Description:
By default, the stateless action for Network Firewall policies in AWS Foundational Security Best Practices should be set to either drop or forward for fragmented packets. This is crucial to ensure the security of your network and prevent potential vulnerabilities.
Troubleshooting Steps:
If you encounter any issues related to this rule, such as fragmented packets not being handled correctly, follow these troubleshooting steps:
Necessary Codes:
If you need to modify the stateless action for fragmented packets in your Network Firewall policy, you can use the following AWS CLI command:
aws network-firewall update-firewall-policy --firewall-policy-name <policy-name> --update-token <update-token> --firewall-policy file://<policy-file.json>
Make sure to replace
<policy-name>
, <update-token>
, and <policy-file.json>
with your actual policy name, update token, and JSON file containing the updated policy configuration.Step-by-Step Guide for Remediation:
To ensure that the stateless action for fragmented packets in your Network Firewall policy is set to either drop or forward, follow these steps:
By following these steps, you can ensure that the default stateless action for fragmented packets in your Network Firewall policy aligns with AWS Foundational Security Best Practices.