Ensure compliance by restricting public restorability of EBS snapshots.
Rule | EBS snapshots should not be publicly restorable |
Framework | CISA-cyber-essentials |
Severity | ✔ Medium |
Rule: EBS Snapshots should not be publicly restorable for CISA Cyber Essentials
Rule Description:
This rule ensures that EBS (Elastic Block Store) snapshots in the AWS (Amazon Web Services) environment are not publicly restorable for compliance with CISA Cyber Essentials requirements. EBS snapshots contain all the data from an EBS volume, including the operating system, applications, and data. Making EBS snapshots publicly restorable can lead to unauthorized access and potential data breaches.
Troubleshooting Steps:
If the EBS snapshots are found to be publicly restorable, follow these troubleshooting steps to restrict public access:
Identify the publicly restorable EBS snapshots:
Verify the permissions of the snapshots:
Update the snapshot permissions:
Repeat steps 3-4 for all publicly restorable snapshots identified in step 1.
Necessary Code:
No code is required for this rule.
Remediation Steps:
Follow these steps to remediate the issue and ensure EBS snapshots are not publicly restorable:
Access the AWS Management Console.
Navigate to the EC2 Dashboard.
Click on "Snapshots" under the "ELASTIC BLOCK STORE" section.
Review the list of snapshots to identify any publicly restorable snapshots.
Select each publicly restorable snapshot and modify its permissions.
In the snapshot details pane, go to the "Permissions" tab.
Click on the "Modify Permissions" button.
In the "Create volume permissions" section, click on the "Define more permissions" link.
Remove the "Public" permission by selecting it and clicking on the "Revoke" button.
Click "Save" to apply the changes.
Repeat steps 5-10 for all publicly restorable snapshots identified in step 4.
After updating the permissions for all affected snapshots, verify that they are no longer publicly restorable.
Note:
It is important to regularly monitor and audit the permissions of EBS snapshots to ensure ongoing compliance with the policy. Additionally, it is recommended to periodically recheck the snapshot permissions to address any potential misconfigurations.