This rule states that VPC network access control lists (network ACLs) should be associated with a subnet.
Rule | VPC network access control lists (network ACLs) should be associated with a subnet. |
Framework | CISA-cyber-essentials |
Severity | ✔ Low |
VPC Network Access Control Lists (ACLs) for CISA-Cyber Essentials
Rule Description
This rule states that for CISA-Cyber Essentials compliance, VPC Network Access Control Lists (ACLs) must be associated with a subnet. ACLs are used to control inbound and outbound traffic at the subnet level within Amazon Virtual Private Cloud (VPC) environments. By associating ACLs with subnets, organizations can enforce specific networking rules and restrict network access based on defined policies.
Potential Troubleshooting Steps
Necessary Codes
Although there are no specific codes to provide for this rule, the following are examples of how ACLs can be associated with a subnet using AWS Command Line Interface (CLI) commands:
To list all available subnets within a VPC:
aws ec2 describe-subnets --filters "Name=vpc-id,Values=<VPC_ID>"
To associate an ACL with a subnet:
aws ec2 replace-network-acl-association --association-id <ASSOCIATION_ID> --network-acl-id <ACL_ID>
Step-by-Step Guide for Remediation
aws ec2 describe-subnets --filters "Name=vpc-id,Values=<VPC_ID>"
By following these steps, you will be able to associate the required VPC Network ACL with the chosen subnet, ensuring compliance with the CISA-Cyber Essentials policy.